Data owner should:
A: Make the policies, procedures and standards that govern our data security.
B: Perform the backups and restores.
C: Be trained in the policies, procedures and standards.
D: Assign the sensitivity labels and backup frequency of the data.
CBK 2: Asset Security
Source: ThorTeaches.com practice tests
D: Data/Information Owner: Management level, they assign sensitivity labels and backup frequency. This could be you or a Data Owner from HR, Payroll or other departments.
IT security trainer.
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.