exam questions

Exam CCSK All Questions

View all questions & answers for the CCSK exam

Exam CCSK topic 1 question 95 discussion

Actual exam question from CSA's CCSK
Question #: 95
Topic #: 1
[All CCSK Questions]

Which statement best describes the Data Security Lifecycle?

  • A. The Data Security Lifecycle has six stages, is strictly linear, and never varies.
  • B. The Data Security Lifecycle has six stages, can be non-linear, and varies in that some data may never pass through all stages.
  • C. The Data Security Lifecycle has five stages, is circular, and varies in that some data may never pass through all stages.
  • D. The Data Security Lifecycle has six stages, can be non-linear, and is distinct in that data must always pass through all phases.
  • E. The Data Security Lifecycle has five stages, can be non-linear, and is distinct in that data must always pass through all phases.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
JoAsiaGje
Highly Voted 8 months, 2 weeks ago
from Security Guidance, page 63: The lifecycle includes six phases from creation to destruction. Although it is shown as a linear progression, once created, data can bounce between phases without restriction, and may not pass through all stages (for example, not all data is eventually destroyed).
upvoted 7 times
...
c0d2291
Most Recent 3 weeks ago
Selected Answer: B
Once created, data can bounce in between phases without restriction, and may not pass through all stages (not all data is eventually destroyed). https://cloudsecurityalliance.org/blog/2021/10/14/the-6-phases-of-data-security
upvoted 1 times
...
moten
6 months, 3 weeks ago
Selected Answer: B
B is the Answer, The Data Security Lifecycle has six stages, can be non-linear, and varies in that some data may never pass through all stages. The Data Security Lifecycle typically consists of six stages: Create, Store, Use, Share, Archive, and Destroy. However, the lifecycle is not strictly linear, and the flow of data through these stages can vary based on the specific requirements and characteristics of the data. Some data may not pass through all stages, depending on factors such as data type, sensitivity, retention requirements, and legal/regulatory obligations. The Data Security Lifecycle is flexible and adaptable to the unique needs of each organization and the data they handle.
upvoted 4 times
...
Brainiac
7 months ago
The statement that best describes the Data Security Lifecycle is: B. The Data Security Lifecycle has six stages, can be non-linear, and varies in that some data may never pass through all stages. The Data Security Lifecycle typically consists of six stages: Identify, Protect, Detect, Respond, Recover, and Review. These stages represent different activities and processes involved in securing data throughout its lifecycle. However, the lifecycle is not strictly linear, and the progression through these stages can vary depending on the specific data and its context. Some data may not pass through all stages of the Data Security Lifecycle. For example, not all data may require the same level of protection or may not be subjected to the same detection and response mechanisms. The lifecycle is flexible and adaptable to different data types, risk levels, and security requirements.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago