Chapter 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Diff: 1 54) Regarding retention policies, firms need to ________. A) implement strong and clear backup policies B) specify how long data will be retained C) ensure implementation is compliant with policies through periodic audits D) All of the above

Answer: A

Diff: 2 47) With RAID 1, the following is achieved ________. A) Redundancy B) Striping C) Both A and B. D) Neither A nor B.

Answer: A

Diff: 2 30) Two computer systems each back up the other in real time in ________. A) CDP B) full duplex backup C) full backup D) All of the above

Answer: A

Diff: 2 48) Another name for RAID 1 is ________. A) Mirroring B) Distributed Parity C) Striping D) None of the above

Answer: A

Diff: 2 67) In a relational database, examples of entities include ________. A) persons B) things C) events D) All of the above

Answer: A

Diff: 2 Question: 23b 12) Image backup is attractive because ________. A) it requires minimal additional work to restore a fully functioning PC B) it is faster than file/directory backup C) it takes up less storage space than file/directory backup D) Both A and C

Answer: A

Diff: 2 Question: 23d 16) ________ allows for very recent file changes to be restored. A) Shadowing B) File backup C) File/folder backup D) Image backup

Answer: A

Diff: 1 78) DDL triggers are used to ________. A) maliciously attack databases B) produce automatic responses if the structure of the database has been altered. C) Both A and B. D) Neither A nor B.

Answer: B

Diff: 1 98) Data destruction is ________. A) optional B) necessary C) Both A and B D) Neither A nor B

Answer: B

Diff: 1 Question: 22 9) File/directory data backup copies ________. A) programs B) data C) registry settings D) Both A and B.

Answer: B

Diff: 1 Question: 24a 23) ________ backups only back up data that has changed since the most recent full backup. A) Differential B) Incremental C) Delta D) None of the above

Answer: B

Diff: 1 Question: 28c 84) Companies address the risk of losing a security key by using ________. A) encryption key resets B) key escrow C) Both A and B D) Neither A nor B

Answer: B

Diff: 2 49) Another name for RAID 5 is ________. A) Mirroring B) Distributed Parity C) Striping D) None of the above.

Answer: B

Diff: 2 80) DML triggers are used to ________. A) maliciously attack databases B) produce automatic responses if the data of the database has been altered. C) Both A and B D) Neither A nor B

Answer: B

Diff: 2 Question: 26d 41) A dual-layer DVD can hold up to about ________ GB. A) 4 B) 8 C) 12 D) 64

Answer: B

Diff: 3 Question: 28i 88) ________ is an example of PII. A) Individual database names B) Social Security number C) Process run to backup servers D) None of the above

Answer: B

Diff: 1 44) Configuring multiple hard drives as an array within a single system is ________. A) a common method of increasing reliability B) a common method of increasing speed C) Both A and B D) Neither A nor B

Answer: C

Diff: 1 46) Another name for RAID 0 is ________. A) Mirroring B) Distributed Parity C) Striping D) None of the above

Answer: C

Diff: 1 89) ________ is the process of obscuring data such that it cannot identify a specific person, but remains practically useful. A) DLP B) PII C) Data masking D) None of the above

Answer: C

Diff: 2 90) Profiling uses ________ to find patterns in a dataset which uniquely identify an individual. A) statistical methods B) algorithms and mathematics C) All of the above. D) None of the above

Answer: C

Diff: 2 20) Companies usually conduct full backups on a ________ basis. A) hourly B) daily C) weekly D) monthly

Answer: C

Diff: 2 28) Compared to local backup, centralized backup ________. A) is more capable of enforcing backup policy B) is more capable of auditing backup policy C) Both A and B D) Neither A nor B

Answer: C

Diff: 2 51) Backup creation policies should specify ________. A) what data should be backed up B) backup restoration tests C) Both A and B D) Neither A nor B

Answer: C

Diff: 2 7) Properly backed up data includes ________. A) ensuring that copies of data files are stored safely and secured B) ensuring that copies of data files will survive even if the data on the host are lost and damaged C) Both A and B D) Neither A nor B

Answer: C

Diff: 2 Question: 27h 57) Who should be involved in the creation of retention policies? A) Business units B) The legal department C) Both A and B D) Neither A nor B

Answer: C

Diff: 2 Question: 30d 93) Adding invisible information to a file that can be used to identify its source is called ________. A) DRM B) data extrusion management C) watermarking D) None of the above.

Answer: C

Diff: 2 Question: 30f 94) To find out who is sending trade secrets out of the firm, you can use ________. A) DRM B) data extrusion management C) watermarking D) None of the above

Answer: C

Diff: 1 61) Retaining data can be ________. A) expensive B) susceptible to discovery of damaging information C) A only D) Both A and B

Answer: D

Diff: 1 76) Which of the following database events should be regularly audited? A) Warnings and exceptions B) Special access and logins C) Changes D) All of the above

Answer: D

Diff: 1 8) Data can be lost by ________. A) mechanical failure B) environmental casualties C) malware D) All of the above

Answer: D

Diff: 1 Question: 24a 21) Full backups are ________. A) performed on all files and directories B) slow C) typically done weekly D) All of the above

Answer: D

Diff: 1 Question: 26a 38) Magnetic tape is ________. A) expensive to use B) very fast C) Both A and B D) Neither A nor B

Answer: D

Diff: 1 Question: 27c 56) Checkouts of backup media for restoration ________. A) are very common B) should be possible to be done immediately if the person checking out the tapes is an on-duty system administrator and signs out for the backup media. C) Both A and B D) Neither A nor B

Answer: D

Diff: 2 15) The process of keeping a backup copy of each file being worked on by backing it up every few minutes is called ________. A) file backup B) file/folder backup C) image backup D) shadowing

Answer: D

Diff: 2 73) Example of DBMSs include ________. A) MySQL, Oracle B) IBM DB2, Microsoft SQL Server C) A only D) Both A and B

Answer: D

Diff: 2 79) DML triggers are used to ________. A) maliciously attack databases B) produce automatic responses if the structure of the database has been altered. C) Both A and B D) Neither A nor B

Answer: D

Diff: 2 81) DLL triggers are used to ________. A) maliciously attack databases B) produce automatic responses if the data of the database has been altered. C) Both A and B D) Neither A nor B

Answer: D

Diff: 2 50) With RAID 5, the following is achieved ________. A) Parity B) Striping C) Redundancy D) All of the above

Answer: D

Diff: 2 65) Databases are ________. A) integrated collections of data B) integrated collections of metadata C) Neither A nor B D) Both A and B

Answer: D

Diff: 2 Question: 28d 85) Trusting users to do key escrow is risky because ________. A) the user may not do it B) the user may not be able to find the key later C) the user may refuse to give it up if fired D) All of the above

Answer: D

Diff: 1 68) In relational database, a row is different from a record.

Answer: FALSE

Diff: 1 100) Wiped data can be read.

Answer: FALSE

Diff: 1 22) Most companies conduct full backups on a daily basis.

Answer: FALSE

Diff: 1 62) Technology is the most effective method of avoiding problems during the legal discovery process.

Answer: FALSE

Diff: 1 70) In relational database, an attribute is the same as a tuple or record.

Answer: FALSE

Diff: 1 77) Triggers are damaging code that attackers use to destroy databases.

Answer: FALSE

Diff: 1 83) Losing an encryption key is not a serious danger.

Answer: FALSE

Diff: 1 Question: 26f 42) Optical disks can safely hold data for decades.

Answer: FALSE

Diff: 1 Question: 27e 53) Backup policies should be audited regularly and include tracing what happens in samples of data.

Answer: FALSE

Diff: 1 Question: 28f 87) If a PC user has full-disk encryption, a weak password is not as great a danger as it would be if the disk were not encrypted.

Answer: FALSE

Diff: 1 Question: 30i 96) Most companies are quick to enforce strict data management policies.

Answer: FALSE

Diff: 2 26) Incremental and full backups may be restored out of order in which they were created.

Answer: FALSE

Diff: 2 5) Properly hardened hosts and securely coded applications can help protect data while it is transmitted.

Answer: FALSE

Diff: 2 64) Spreadsheets are rarely the subject of compliance regulations.

Answer: FALSE

Diff: 2 71) When performing trend analysis, increasing granularity in queries is desirable.

Answer: FALSE

Diff: 2 Question: 23a 10) File/directory data backup copies data, programs, configurations, and registry settings.

Answer: FALSE

Diff: 2 Question: 23a 11) File/directory backup is slower and takes up more storage space than image backup.

Answer: FALSE

Diff: 2 Question: 23c 13) Image backup is a fast form of backups.

Answer: FALSE

Diff: 2 Question: 23e 17) Normally, there is no limit on how long shadowing may maintain backed up files.

Answer: FALSE

Diff: 2 Question: 23f 18) Typically, the shadow storage space is nearly unlimited.

Answer: FALSE

Diff: 2 Question: 24b 24) Differential backups only back up data that has changed since the most recent full backup.

Answer: FALSE

Diff: 2 Question: 25a 29) With local backup processes, policies are easily enforced.

Answer: FALSE

Diff: 2 Question: 25b 31) CDP is inexpensive to use.

Answer: FALSE

Diff: 2 Question: 25d 32) With centralized backup, each location backs up the other in real time.

Answer: FALSE

Diff: 2 Question: 26b 39) Backup onto another hard drive is a very slow method of backup.

Answer: FALSE

Diff: 2 Question: 28a 59) Policies should not require that backup data be encrypted.

Answer: FALSE

Diff: 2 Question: 30g 95) Restrictions on removable media should be enforced by relying on user behavior, rather than technological restrictions.

Answer: FALSE

1) Data is the principal element of any information system.

Answer: TRUE

Diff: 1 2) Another name for data is raw facts.

Answer: TRUE

Diff: 1 3) Using a secure cryptographic system can prevent attacks while data is being transmitted.

Answer: TRUE

Diff: 1 36) Backed-up data must be physically stored on something.

Answer: TRUE

Diff: 1 45) A system using an array of drives increases reliability.

Answer: TRUE

Diff: 1 60) Retaining data can create negative consequences.

Answer: TRUE

Diff: 1 69) In relational database, a row is the same as a tuple or record.

Answer: TRUE

Diff: 1 97) One of the most often overlooked mechanisms used to reduce data loss is employee training.

Answer: TRUE

Diff: 1 99) The most common form of deletion in Windows-based systems is nominal deletion.

Answer: TRUE

Diff: 1 75) Sanitation can protect against SQL injection attacks.

Answer: TRUE

Diff: 1 Question: 26h 43) Writing data to an array of hard drives has several advantages over writing to a single drive.

Answer: TRUE

Diff: 1 Question: 27a 52) Backup media should be encrypted.

Answer: TRUE

Diff: 1 Question: 30a 92) DRM usually is difficult to enforce.

Answer: TRUE

Diff: 2 14) With image backup, even if the entire hard drive is lost, its content can be restored onto the same machine or a different machine.

Answer: TRUE

Diff: 2 19) Typically, having enough shadow backup space for a few days is sufficient.

Answer: TRUE

Diff: 2 27) Incremental backups are usually discarded after the next full backup.

Answer: TRUE

Diff: 2 33) CDP requires expensive high-speed transmission link between the sites.

Answer: TRUE

Diff: 2 35) Mesh backup is where client PCs in an organization back up each other.

Answer: TRUE

Diff: 2 37) Magnetic tape can store large amounts of data at the lowest cost per bit of any backup medium.

Answer: TRUE

Diff: 2 4) Using a secure cryptographic system can prevent attacks while data is being processed.

Answer: TRUE

Diff: 2 55) In the long term, backup media should be stored at a different site.

Answer: TRUE

Diff: 2 6) Properly hardened hosts and securely coded applications can help protect data while it is processed.

Answer: TRUE

Diff: 2 63) Training users what not to put into e-mail messages is the most effective method of avoiding problems during the legal discovery process.

Answer: TRUE

Diff: 2 66) Most databases are relational databases.

Answer: TRUE

Diff: 2 72) When performing trend analysis, decreasing granularity in queries is desirable.

Answer: TRUE

Diff: 2 74) Validation can protect against SQL injection attacks.

Answer: TRUE

Diff: 2 91) DRM restricts what people can do with sensitive material.

Answer: TRUE

Diff: 2 34) With CDP, each location backs up the other in real time.

Answer: TRUE

Diff: 2 Question: 24b 25) Incremental and full backups must be restored in the order in which they were created.

Answer: TRUE

Diff: 2 Question: 26c 40) Backing up data to a second hard drive on a computer is more expensive than backup onto to magnetic tape.

Answer: TRUE

Diff: 2 Question: 27i 58) From a legal standpoint, loss of encrypted data comes with negligible risk from the loss private information.

Answer: TRUE

Diff: 2 Question: 28e 86) Encryption is usually fully transparent to the PC user.

Answer: TRUE

Diff: 3 82) Changing the default listening port is an effective way of discouraging attackers from accessing the database.

Answer: TRUE


Ensembles d'études connexes

Nursing Concepts - Beginning test

View Set

EHS 100, Chapter 13 (Occupational Health)

View Set

CompTIA Security+ SYO 601 Chapter 7 Cryptography and the Public Key Infrastructure

View Set

Living Environment Unit 2 Review

View Set

Ch. 25 Module 2: Section 25.03-25.05 Dynamic Study Module

View Set