nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #459

CERTIFIED-IN-CYBERSECURITY Question #459: Real Exam Question with Answer & Explanation

The correct answer is A: Data compromise result in no harm. The term 'unrestricted public data' implies that compromising this data would cause no harm (see ISC2 Study Guide, Chapter 5, Module 1). In other words, the data is public and unrestricted, meaning it's freely accessible and available to anyone. For example, weather data is a typ

Security Principles

Question

What does the label 'unrestricted public data' mean?

Options

  • AData compromise result in no harm
  • BData compromise could result in loss of temporary competitive advantage
  • CData compromise could cause minor disruption
  • DData compromise could result in significant loss of life

Explanation

The term 'unrestricted public data' implies that compromising this data would cause no harm (see ISC2 Study Guide, Chapter 5, Module 1). In other words, the data is public and unrestricted, meaning it's freely accessible and available to anyone. For example, weather data is a type of unrestricted (open) public data. If this data were compromised, no harm would result because it is already freely available to the public. The other options refer to sensitive and confidential data. Data that, if compromised, could result in significant loss of life, such as medical or emergency services data, would be classified as 'highly sensitive' or 'confidential'; not as unrestricted public data. Data that could result in a temporary loss of competitive advantage, such as proprietary business information, would also be classified as confidential. Finally, data that could cause minor disruption, such as internal but non-confidential business communications, would be classified as "internal' data. Again, not unrestricted public data.

Topics

#Data classification#Data types#Information security principles#Impact assessment

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions