from Security Guidance, page 63:
The lifecycle includes six phases from creation to destruction. Although it is shown as a linear progression, once created, data can bounce between phases without restriction, and may not pass through all stages (for example, not all data is eventually destroyed).
Once created, data can bounce in between phases without restriction, and may not pass through all stages (not all data is eventually destroyed).
https://cloudsecurityalliance.org/blog/2021/10/14/the-6-phases-of-data-security
B is the Answer,
The Data Security Lifecycle has six stages, can be non-linear, and varies in that some data may never pass through all stages.
The Data Security Lifecycle typically consists of six stages: Create, Store, Use, Share, Archive, and Destroy. However, the lifecycle is not strictly linear, and the flow of data through these stages can vary based on the specific requirements and characteristics of the data. Some data may not pass through all stages, depending on factors such as data type, sensitivity, retention requirements, and legal/regulatory obligations. The Data Security Lifecycle is flexible and adaptable to the unique needs of each organization and the data they handle.
The statement that best describes the Data Security Lifecycle is:
B. The Data Security Lifecycle has six stages, can be non-linear, and varies in that some data may never pass through all stages.
The Data Security Lifecycle typically consists of six stages: Identify, Protect, Detect, Respond, Recover, and Review. These stages represent different activities and processes involved in securing data throughout its lifecycle. However, the lifecycle is not strictly linear, and the progression through these stages can vary depending on the specific data and its context.
Some data may not pass through all stages of the Data Security Lifecycle. For example, not all data may require the same level of protection or may not be subjected to the same detection and response mechanisms. The lifecycle is flexible and adaptable to different data types, risk levels, and security requirements.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
JoAsiaGje
Highly Voted 8 months, 2 weeks agoc0d2291
Most Recent 3 weeks agomoten
6 months, 3 weeks agoBrainiac
7 months ago