Question: The information classification scheme should:
A.) consider possible impact of a security breach.
B.) classify personal information in electronic form.
C.) be performed by the information security manager.
D.) classify systems according to the data processeD.)

Download pdf (with explanations) edition of this exam.