ANSWERS] WITH STUDY GUIDE DETAILED AND VERIFIED FOR
GUARANTEED PASS- LATEST UPDATE 2025 GRADED A
True or False: FTP is a secure method for transferring sensitive records. -
CORRECT ANSWER False - File Transfer Protocol
What is the most preferred method of classification for records management? -
CORRECT ANSWER Functional classification — based on business
functions and activities.
What's the difference between classification and taxonomy? - CORRECT
ANSWER Classification is for managing records, while taxonomy is a broader
structure for organizing all content.
What type of access control involves using passwords or biometric scans to
verify user identity? - CORRECT ANSWER Logical Access Control - Ensures
only authorized users can access systems or digital records.
Which type of access control ensures physical protection of sensitive records,
like locked doors or surveillance cameras? - CORRECT ANSWER Physical
Access Control - Protects physical spaces where records are stored.
What type of access control is enforced through policies, procedures, and
employee training on record management and security? - CORRECT ANSWER
Administrative Access Control - Focuses on guidelines and training to control
access to records.
What type of access control uses encryption, firewalls, and intrusion detection
systems to protect digital records? - CORRECT ANSWER Technical Access
Control - Involves technological measures to secure data and systems from
unauthorized access.
Which access control type is most relevant for ensuring that only authorized
personnel can access physical storage rooms or data centers? - CORRECT
ANSWER Physical Access Control - Controls physical entry to sensitive areas.
Which access control method includes role-based access (RBAC) and two-factor
authentication? - CORRECT ANSWER Logical Access Control - Ensures
users have the correct permissions based on their role and identity verification.
,What is a key feature of administrative access control that helps manage records
securely? - CORRECT ANSWER Access Request Procedures - Defines how
individuals request and are granted access based on their role or need.
What is the primary function of a firewall in technical access control? -
CORRECT ANSWER Firewall - Blocks unauthorized access to a network and
protects sensitive data from external threats.
Which access control type would use a keycard to ensure only authorized
employees can enter a restricted room? - CORRECT ANSWER physical
Access Control - Restricts entry to secure areas using physical barriers.
Which type of access control is primarily concerned with ensuring data is
encrypted during transmission or storage? - CORRECT ANSWER Technical
Access Control - Encrypts data to prevent unauthorized access or alteration.
What does confidentiality of a record ensure? - CORRECT ANSWER Records
are only accessible to authorized users. Who can see the records.
What type of access control involves audit trails to monitor who accessed certain
records and when? - CORRECT ANSWER Logical Access Control - Monitors
user activity within systems to ensure accountability and track potential security
breaches.
What access control method would be used for restricting data access based on
a user's role within an organization? - CORRECT ANSWER Role-Based
Access Control (RBAC) - Users are assigned roles and are granted permissions
accordingly.
What are the key stages in the life cycle of paper documents? - CORRECT
ANSWER Creation, Use, Storage, Retention, Disposition.
What is magnetic media and its common types? - CORRECT ANSWER
Storage media using magnetization, such as hard drives and magnetic tapes.
What are the disadvantages of magnetic media? - CORRECT ANSWER
Susceptible to data degradation, slower retrieval, and physical damage.
What is optical media and its examples? - CORRECT ANSWER Media that
stores data with laser technology, such as CDs, DVDs, and Blu-ray discs.
What are the disadvantages of optical media? - CORRECT ANSWER Limited
storage capacity, prone to scratches, requires specific hardware to read.
, What does Integrity of a record ensure? - CORRECT ANSWER records are
complete, accurate, and unaltered since their creation or receipt. If it's about data
being unchanged, that's integrity.
What does Reliability of a record ensure? - CORRECT ANSWER A reliable
record is one that can be trusted to accurately reflect the business activity or
transaction it documents. If the question is about a record being "accurate and
trustworthy", it's usually about reliability.
What does Availability of record ensure? - CORRECT ANSWER Ensures that
records are accessible when needed by authorized personnel. if it's about being
able to access it, that's availability.
What are common elements in a classification system? - CORRECT ANSWER
Class name, code, description, retention rule, and security level.
How does classification support compliance? - CORRECT ANSWER By
linking record types to retention schedules, legal holds, and access controls.
Which of the following is NOT a typical component of a classification system? -
CORRECT ANSWER User preferences
What is the primary goal of a records audit? - CORRECT ANSWER To
evaluate compliance with records policies, procedures, and legal/regulatory
requirements.
Which of the following is a key output of a records risk assessment? - CORRECT
ANSWER Risk mitigation plan
What is a risk assessment in records management? - CORRECT ANSWER
The process of identifying, analyzing, and evaluating potential risks to the
records and information management (RIM) program.
What is a records audit? - CORRECT ANSWER A systematic evaluation of
RIM activities to ensure compliance with laws, policies, and procedures.
What are the four main categories of risk in records management? Hint: "All
records live together: - CORRECT ANSWER Administrative, Records
Control, Legal/Regulatory, and Technological Risk.
What tool is often used to score and prioritize risks? - CORRECT ANSWER A
risk matrix or risk scoring model.