LAB 3.3-A Tier 1: In-Browser Obj 3.3 · intermediate · ~15min

Data Classification & Lifecycle

Classify data assets for two different organizations, select appropriate protections for each data state (at rest, in transit, in use), and make lifecycle decisions about retention, destruction, and regulatory deletion requests.

What You’ll Practice

  • Assigning classification levels (Public, Internal, Confidential, Restricted) based on data sensitivity and regulatory requirements
  • Selecting appropriate cryptographic and access controls for data at rest, in transit, and in use
  • Making lifecycle decisions: retention periods, destruction methods, and GDPR/CCPA deletion workflows
  • Applying different classification frameworks across industries (PCI/consumer vs. CUI/classified)

How the Exam Tests This

Objective 3.3 covers data protection techniques across all three states — at rest, in transit, and in use. CompTIA expects you to match encryption methods and access controls to data sensitivity levels, understand when tokenization beats encryption, know the difference between crypto-shredding and physical destruction, and handle regulatory deletion requests without breaking audit trail requirements. Expect scenario questions that combine classification, protection selection, and lifecycle decisions.

Scoring

Each scenario is scored across three sections: classification accuracy (correct sensitivity level per asset), protection selection (appropriate controls for each data state), and lifecycle decisions (correct handling of retention/destruction/deletion scenarios). Sections are weighted equally. Final percentage reflects combined performance across both organizational scenarios.

MISSION

Classify data, protect it across all three states, and make the right call when it is time to destroy it.

You will work through two organizational scenarios. For each, you classify data assets, select protections for the most sensitive items, and handle lifecycle decisions including regulatory deletion requests and media destruction.

SCENARIOS

  • E-Commerce: NovaMart Online (PCI DSS / CCPA)
  • Government Contractor: Meridian Defense Systems (NIST 800-171 / CMMC / ITAR)

HOW IT WORKS

Phase A — Classify: Assign a classification level to each data asset based on sensitivity and regulatory requirements.

Phase B — Protect: For the four most sensitive assets, select controls for data at rest, in transit, and in use.

Phase C — Lifecycle: Handle retention, destruction, and deletion scenarios.

2 scenarios · 3 phases each · ~15 minutes