A(n) _________ is a formal access control methodology used to assign a level of
confidentiality to an information asset and thus restrict the number of people who can access it.

A. security clearance scheme
B. data recovery scheme
C. risk management scheme
D. data classification scheme

Answer: D

Computer Science & Information Technology

You might also like to view...

It is helpful to sketch a form or report before creating these objects in Access

Indicate whether the statement is true or false

Computer Science & Information Technology

You can apply 3D properties to ____ instances.

A. graphic B. text C. movie clip D. all of the above

Computer Science & Information Technology