During a review, sensitive company information was publicly accessible. Which policy was violated?

Prepare for the EC-Council Certified Ethical Hacker (CEH) Certification. Use flashcards and multiple choice questions with hints and explanations. Ace your exam!

Multiple Choice

During a review, sensitive company information was publicly accessible. Which policy was violated?

Explanation:
Public exposure of sensitive information points to how internet usage and online publication of data are governed. An Internet Policy lays out what is permitted when using the organization's internet and, crucially, what can and cannot be published publicly. If during a review sensitive data becomes publicly accessible, that signals a failure to follow rules about publishing information online, which is exactly what an Internet Policy is designed to prevent. A Data Security Policy focuses on protecting data regardless of where it resides, but the described scenario emphasizes the act of making information accessible on the internet, tying most directly to internet-specific publishing and access rules. A Privacy Policy deals with handling personal information and privacy rights, which isn’t the main issue here. An Acceptable Use Policy covers general acceptable behavior with IT resources, but the explicit risk illustrated is public dissemination of sensitive content, which the Internet Policy governs.

Public exposure of sensitive information points to how internet usage and online publication of data are governed. An Internet Policy lays out what is permitted when using the organization's internet and, crucially, what can and cannot be published publicly. If during a review sensitive data becomes publicly accessible, that signals a failure to follow rules about publishing information online, which is exactly what an Internet Policy is designed to prevent.

A Data Security Policy focuses on protecting data regardless of where it resides, but the described scenario emphasizes the act of making information accessible on the internet, tying most directly to internet-specific publishing and access rules. A Privacy Policy deals with handling personal information and privacy rights, which isn’t the main issue here. An Acceptable Use Policy covers general acceptable behavior with IT resources, but the explicit risk illustrated is public dissemination of sensitive content, which the Internet Policy governs.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy