2-18.2 Data Protection Methods Flashcards
1
Q
Cryptographic technique used to prove integrity
A
Hashing
2
Q
The process in which individually identifiable information is altered in such a way that it can no longer be traced back to an individual
A
Anonymization
3
Q
Solutions designed to detect data movement and to prevent exfiltration
A
Data Loss Prevention (DLP)
4
Q
This solution used proxy and auto discovery to identify cloud applications
A
CASB
5
Q
The objective of this solution is to prevent unauthorized copying, distribution, and use of digital content
A
DRM