Which of the following is an example of a breach?

Prepare for the 2026 George Access Test. Use flashcards and multiple-choice questions, each with hints and explanations. Get exam-ready now!

Accessing information without authorization is a clear example of a breach because it involves violating the established protocols that protect sensitive data. A breach is typically characterized by unauthorized access or disclosure of confidential information, which undermines the integrity and trust in data management practices.

In this context, accessing information without proper permission directly contravenes security policies designed to protect data from unauthorized users. This type of activity poses significant risks to individuals and organizations, as it can lead to identity theft, data theft, and other adverse consequences.

In contrast, the other options involve actions that enhance security or ensure compliance with data protection standards, such as properly disposing of documents, securing data with encryption, and conducting security risk assessments. These practices are essential for maintaining data integrity and minimizing the risk of breaches. Therefore, the choice that exemplifies a breach is the act of accessing information without authorization.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy