Data Loss Prevention and Mobile Endpoint Protection Graded Assessment

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

IBM Guardium provides heterogeneous data source support. This support results in which capability?

(NOT)Different security policies can be applied against data of the same type (NOT)Each data repository can maintain a unique security policy

Which mobile operating system was originally based on the Linux kernel?

Android

What is one limitation to the operation of anti-virus software running on mobile devices?

Antivirus software can "see" the apps that are running on a mobile device but cannot see the data that is associated with each app.

On a mobile device, which type of threat is a phishing scam?

App based

A university uses clustered servers to make sure students will always be able to submit their assignments even if one server is down for maintenance. Server clustering enables which aspect of the CIA Triad?

Avaliability

A university has enabled WPA2 encryption on its WiFi systems throughout the campus. Which aspect of the CIA Triad is directly supported by this action?

Confidentiality

Which three (3) of these are among the top 12 capabilities that a good data security and protection solution should provide? (Select 3)

Encryption Data classification Data and file monitoring

Which three (3) of these are among the 5 common pitfalls of data security? (Select 3)

Failure to move beyond compliance Failure to address known vulnerabilities Failure to prioritize and leverage data activity monitoring

True of False. A biotech research company with a very profitable product line has grown so rapidly it has acquired a marketing company, a small IT services company and a company that specializes in pharmaceutical manufacturing and distribution. The CEO of the parent company made a good decision when he decided not to consolidate all data security under a single CISO, believing that each of the new divisions understands its own data security needs better than the parent company possibly could.

False

True or False. Security is enhanced on Android mobile devices because users interact directly with the operating system.

False

Which two (2) mobile operating combined dominate the vast majority of the smartphone market? (Select 2)

IOS/Android

A student can see her grades via her school's Student Portal but is unable to change them. This restriction is in support of which aspect of the CIA Triad?

Integrity

C-level executives face 4 challenges when assuring their organizations maintain a comprehensive and workable data security solution. GDPR, CCPA, and PCC-DSS are concerned with which one of these challenges?

New privacy regulations

Which data protection process substitutes key data with a token that is issued by a trusted third-party where the token can be accessed but not redeemed by an untrusted party?

Tokenization

All industries have their own unique data security challenges. Which of these industries has a particular concern with a widely distributed IT infrastructure that must provide services across a multiple government jurisdictions while not violating the privacy concerns of its users?

Transportation

True or False. An operator who corrupts data by mistake is considered an "inadvertent attack" that should be considered when developing data protection plans.

True

Which is the data protection process that addresses inappropriate privileges, insecure authentication methods, account sharing, configuration files and missing security patches?

Vulnerability assessment


संबंधित स्टडी सेट्स

BLW 302 (Exam 1-2-3-4-5) Study Guide

View Set

Additional Chp. 13 Questions for Test 1

View Set

Greathouse nutrition final- ch. 14

View Set

Prep U Chapter 46: Management of Patients With Gastric and Duodenal Disorders

View Set