Quiz: Executing a data governance strategy

A five-question multiple-choice quiz to test your understanding of the content presented by expert Russell L. Jones in this lesson of SearchSecurity.com's Data Protection Security School.

SearchSecurity.com Security School

This quiz is part of the SearchSecurity.com Data Protection Security School lesson Executing a data governance strategy. Visit the lesson page for additional learning resources.

1. Which of the following is not one of the five stages of the data lifecycle?

  1. Storage
  2. Destruction
  3. Acquisition
  4. Anonymization
  5. Sharing

2. Which of the following is not a "source" of data protection requirements?

  1. Business partner contracts
  2. Customer lists
  3. Geographic location
  4. Regulatory
  5. Legal

3. Which of the following standards could be leveraged as the basis of an enterprise data protection framework?

  1. ISO17799:2005
  2. COBIT 4.1
  3. AS/NZ 4360
  4. All of the above
  5. None of the above

4. One of the things that you could not do with the enterprise data protection framework is:

  1. Perform a gap analysis of existing data protection controls
  2. Remediate data protection gaps
  3. Address segregation of duties issues in an ERP system
  4. Develop a roadmap for the enterprise data protection program
  5. None of the above

5. The pre-requisite work that is recommended to be addressed before embarking on an enterprise data protection framework includes:

  1. Enterprise role design
  2. Determining what data elements are in scope
  3. Determining where the data exists
  4. B and C
  5. All of the above

If you answered two or more questions incorrectly, revisit the materials from SearchSecurity.com's Data Protection Security School lesson Executing a data governance strategy :

This was last published in October 2007

Dig Deeper on Data security strategies and governance