Chapter 9
Diff: 1 54) Regarding retention policies, firms need to ________. A) implement strong and clear backup policies B) specify how long data will be retained C) ensure implementation is compliant with policies through periodic audits D) All of the above
Answer: A
Diff: 2 47) With RAID 1, the following is achieved ________. A) Redundancy B) Striping C) Both A and B. D) Neither A nor B.
Answer: A
Diff: 2 30) Two computer systems each back up the other in real time in ________. A) CDP B) full duplex backup C) full backup D) All of the above
Answer: A
Diff: 2 48) Another name for RAID 1 is ________. A) Mirroring B) Distributed Parity C) Striping D) None of the above
Answer: A
Diff: 2 67) In a relational database, examples of entities include ________. A) persons B) things C) events D) All of the above
Answer: A
Diff: 2 Question: 23b 12) Image backup is attractive because ________. A) it requires minimal additional work to restore a fully functioning PC B) it is faster than file/directory backup C) it takes up less storage space than file/directory backup D) Both A and C
Answer: A
Diff: 2 Question: 23d 16) ________ allows for very recent file changes to be restored. A) Shadowing B) File backup C) File/folder backup D) Image backup
Answer: A
Diff: 1 78) DDL triggers are used to ________. A) maliciously attack databases B) produce automatic responses if the structure of the database has been altered. C) Both A and B. D) Neither A nor B.
Answer: B
Diff: 1 98) Data destruction is ________. A) optional B) necessary C) Both A and B D) Neither A nor B
Answer: B
Diff: 1 Question: 22 9) File/directory data backup copies ________. A) programs B) data C) registry settings D) Both A and B.
Answer: B
Diff: 1 Question: 24a 23) ________ backups only back up data that has changed since the most recent full backup. A) Differential B) Incremental C) Delta D) None of the above
Answer: B
Diff: 1 Question: 28c 84) Companies address the risk of losing a security key by using ________. A) encryption key resets B) key escrow C) Both A and B D) Neither A nor B
Answer: B
Diff: 2 49) Another name for RAID 5 is ________. A) Mirroring B) Distributed Parity C) Striping D) None of the above.
Answer: B
Diff: 2 80) DML triggers are used to ________. A) maliciously attack databases B) produce automatic responses if the data of the database has been altered. C) Both A and B D) Neither A nor B
Answer: B
Diff: 2 Question: 26d 41) A dual-layer DVD can hold up to about ________ GB. A) 4 B) 8 C) 12 D) 64
Answer: B
Diff: 3 Question: 28i 88) ________ is an example of PII. A) Individual database names B) Social Security number C) Process run to backup servers D) None of the above
Answer: B
Diff: 1 44) Configuring multiple hard drives as an array within a single system is ________. A) a common method of increasing reliability B) a common method of increasing speed C) Both A and B D) Neither A nor B
Answer: C
Diff: 1 46) Another name for RAID 0 is ________. A) Mirroring B) Distributed Parity C) Striping D) None of the above
Answer: C
Diff: 1 89) ________ is the process of obscuring data such that it cannot identify a specific person, but remains practically useful. A) DLP B) PII C) Data masking D) None of the above
Answer: C
Diff: 2 90) Profiling uses ________ to find patterns in a dataset which uniquely identify an individual. A) statistical methods B) algorithms and mathematics C) All of the above. D) None of the above
Answer: C
Diff: 2 20) Companies usually conduct full backups on a ________ basis. A) hourly B) daily C) weekly D) monthly
Answer: C
Diff: 2 28) Compared to local backup, centralized backup ________. A) is more capable of enforcing backup policy B) is more capable of auditing backup policy C) Both A and B D) Neither A nor B
Answer: C
Diff: 2 51) Backup creation policies should specify ________. A) what data should be backed up B) backup restoration tests C) Both A and B D) Neither A nor B
Answer: C
Diff: 2 7) Properly backed up data includes ________. A) ensuring that copies of data files are stored safely and secured B) ensuring that copies of data files will survive even if the data on the host are lost and damaged C) Both A and B D) Neither A nor B
Answer: C
Diff: 2 Question: 27h 57) Who should be involved in the creation of retention policies? A) Business units B) The legal department C) Both A and B D) Neither A nor B
Answer: C
Diff: 2 Question: 30d 93) Adding invisible information to a file that can be used to identify its source is called ________. A) DRM B) data extrusion management C) watermarking D) None of the above.
Answer: C
Diff: 2 Question: 30f 94) To find out who is sending trade secrets out of the firm, you can use ________. A) DRM B) data extrusion management C) watermarking D) None of the above
Answer: C
Diff: 1 61) Retaining data can be ________. A) expensive B) susceptible to discovery of damaging information C) A only D) Both A and B
Answer: D
Diff: 1 76) Which of the following database events should be regularly audited? A) Warnings and exceptions B) Special access and logins C) Changes D) All of the above
Answer: D
Diff: 1 8) Data can be lost by ________. A) mechanical failure B) environmental casualties C) malware D) All of the above
Answer: D
Diff: 1 Question: 24a 21) Full backups are ________. A) performed on all files and directories B) slow C) typically done weekly D) All of the above
Answer: D
Diff: 1 Question: 26a 38) Magnetic tape is ________. A) expensive to use B) very fast C) Both A and B D) Neither A nor B
Answer: D
Diff: 1 Question: 27c 56) Checkouts of backup media for restoration ________. A) are very common B) should be possible to be done immediately if the person checking out the tapes is an on-duty system administrator and signs out for the backup media. C) Both A and B D) Neither A nor B
Answer: D
Diff: 2 15) The process of keeping a backup copy of each file being worked on by backing it up every few minutes is called ________. A) file backup B) file/folder backup C) image backup D) shadowing
Answer: D
Diff: 2 73) Example of DBMSs include ________. A) MySQL, Oracle B) IBM DB2, Microsoft SQL Server C) A only D) Both A and B
Answer: D
Diff: 2 79) DML triggers are used to ________. A) maliciously attack databases B) produce automatic responses if the structure of the database has been altered. C) Both A and B D) Neither A nor B
Answer: D
Diff: 2 81) DLL triggers are used to ________. A) maliciously attack databases B) produce automatic responses if the data of the database has been altered. C) Both A and B D) Neither A nor B
Answer: D
Diff: 2 50) With RAID 5, the following is achieved ________. A) Parity B) Striping C) Redundancy D) All of the above
Answer: D
Diff: 2 65) Databases are ________. A) integrated collections of data B) integrated collections of metadata C) Neither A nor B D) Both A and B
Answer: D
Diff: 2 Question: 28d 85) Trusting users to do key escrow is risky because ________. A) the user may not do it B) the user may not be able to find the key later C) the user may refuse to give it up if fired D) All of the above
Answer: D
Diff: 1 68) In relational database, a row is different from a record.
Answer: FALSE
Diff: 1 100) Wiped data can be read.
Answer: FALSE
Diff: 1 22) Most companies conduct full backups on a daily basis.
Answer: FALSE
Diff: 1 62) Technology is the most effective method of avoiding problems during the legal discovery process.
Answer: FALSE
Diff: 1 70) In relational database, an attribute is the same as a tuple or record.
Answer: FALSE
Diff: 1 77) Triggers are damaging code that attackers use to destroy databases.
Answer: FALSE
Diff: 1 83) Losing an encryption key is not a serious danger.
Answer: FALSE
Diff: 1 Question: 26f 42) Optical disks can safely hold data for decades.
Answer: FALSE
Diff: 1 Question: 27e 53) Backup policies should be audited regularly and include tracing what happens in samples of data.
Answer: FALSE
Diff: 1 Question: 28f 87) If a PC user has full-disk encryption, a weak password is not as great a danger as it would be if the disk were not encrypted.
Answer: FALSE
Diff: 1 Question: 30i 96) Most companies are quick to enforce strict data management policies.
Answer: FALSE
Diff: 2 26) Incremental and full backups may be restored out of order in which they were created.
Answer: FALSE
Diff: 2 5) Properly hardened hosts and securely coded applications can help protect data while it is transmitted.
Answer: FALSE
Diff: 2 64) Spreadsheets are rarely the subject of compliance regulations.
Answer: FALSE
Diff: 2 71) When performing trend analysis, increasing granularity in queries is desirable.
Answer: FALSE
Diff: 2 Question: 23a 10) File/directory data backup copies data, programs, configurations, and registry settings.
Answer: FALSE
Diff: 2 Question: 23a 11) File/directory backup is slower and takes up more storage space than image backup.
Answer: FALSE
Diff: 2 Question: 23c 13) Image backup is a fast form of backups.
Answer: FALSE
Diff: 2 Question: 23e 17) Normally, there is no limit on how long shadowing may maintain backed up files.
Answer: FALSE
Diff: 2 Question: 23f 18) Typically, the shadow storage space is nearly unlimited.
Answer: FALSE
Diff: 2 Question: 24b 24) Differential backups only back up data that has changed since the most recent full backup.
Answer: FALSE
Diff: 2 Question: 25a 29) With local backup processes, policies are easily enforced.
Answer: FALSE
Diff: 2 Question: 25b 31) CDP is inexpensive to use.
Answer: FALSE
Diff: 2 Question: 25d 32) With centralized backup, each location backs up the other in real time.
Answer: FALSE
Diff: 2 Question: 26b 39) Backup onto another hard drive is a very slow method of backup.
Answer: FALSE
Diff: 2 Question: 28a 59) Policies should not require that backup data be encrypted.
Answer: FALSE
Diff: 2 Question: 30g 95) Restrictions on removable media should be enforced by relying on user behavior, rather than technological restrictions.
Answer: FALSE
1) Data is the principal element of any information system.
Answer: TRUE
Diff: 1 2) Another name for data is raw facts.
Answer: TRUE
Diff: 1 3) Using a secure cryptographic system can prevent attacks while data is being transmitted.
Answer: TRUE
Diff: 1 36) Backed-up data must be physically stored on something.
Answer: TRUE
Diff: 1 45) A system using an array of drives increases reliability.
Answer: TRUE
Diff: 1 60) Retaining data can create negative consequences.
Answer: TRUE
Diff: 1 69) In relational database, a row is the same as a tuple or record.
Answer: TRUE
Diff: 1 97) One of the most often overlooked mechanisms used to reduce data loss is employee training.
Answer: TRUE
Diff: 1 99) The most common form of deletion in Windows-based systems is nominal deletion.
Answer: TRUE
Diff: 1 75) Sanitation can protect against SQL injection attacks.
Answer: TRUE
Diff: 1 Question: 26h 43) Writing data to an array of hard drives has several advantages over writing to a single drive.
Answer: TRUE
Diff: 1 Question: 27a 52) Backup media should be encrypted.
Answer: TRUE
Diff: 1 Question: 30a 92) DRM usually is difficult to enforce.
Answer: TRUE
Diff: 2 14) With image backup, even if the entire hard drive is lost, its content can be restored onto the same machine or a different machine.
Answer: TRUE
Diff: 2 19) Typically, having enough shadow backup space for a few days is sufficient.
Answer: TRUE
Diff: 2 27) Incremental backups are usually discarded after the next full backup.
Answer: TRUE
Diff: 2 33) CDP requires expensive high-speed transmission link between the sites.
Answer: TRUE
Diff: 2 35) Mesh backup is where client PCs in an organization back up each other.
Answer: TRUE
Diff: 2 37) Magnetic tape can store large amounts of data at the lowest cost per bit of any backup medium.
Answer: TRUE
Diff: 2 4) Using a secure cryptographic system can prevent attacks while data is being processed.
Answer: TRUE
Diff: 2 55) In the long term, backup media should be stored at a different site.
Answer: TRUE
Diff: 2 6) Properly hardened hosts and securely coded applications can help protect data while it is processed.
Answer: TRUE
Diff: 2 63) Training users what not to put into e-mail messages is the most effective method of avoiding problems during the legal discovery process.
Answer: TRUE
Diff: 2 66) Most databases are relational databases.
Answer: TRUE
Diff: 2 72) When performing trend analysis, decreasing granularity in queries is desirable.
Answer: TRUE
Diff: 2 74) Validation can protect against SQL injection attacks.
Answer: TRUE
Diff: 2 91) DRM restricts what people can do with sensitive material.
Answer: TRUE
Diff: 2 34) With CDP, each location backs up the other in real time.
Answer: TRUE
Diff: 2 Question: 24b 25) Incremental and full backups must be restored in the order in which they were created.
Answer: TRUE
Diff: 2 Question: 26c 40) Backing up data to a second hard drive on a computer is more expensive than backup onto to magnetic tape.
Answer: TRUE
Diff: 2 Question: 27i 58) From a legal standpoint, loss of encrypted data comes with negligible risk from the loss private information.
Answer: TRUE
Diff: 2 Question: 28e 86) Encryption is usually fully transparent to the PC user.
Answer: TRUE
Diff: 3 82) Changing the default listening port is an effective way of discouraging attackers from accessing the database.
Answer: TRUE