2-18.2 Data Protection Methods Flashcards

1
Q

Cryptographic technique used to prove integrity

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The process in which individually identifiable information is altered in such a way that it can no longer be traced back to an individual

A

Anonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Solutions designed to detect data movement and to prevent exfiltration

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This solution used proxy and auto discovery to identify cloud applications

A

CASB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The objective of this solution is to prevent unauthorized copying, distribution, and use of digital content

A

DRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly