Chapter 3 Enterprise Data Security Mark B Flashcards

1
Q

What security setting is it when Group Policy prevents my flash drive from being recognized by my Windows computer?

A. Watermarking
B. Blocking the use of external media
C. Print blocking
D. Data classification blocking

A

B. Blocking the use of external media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What stops me from capturingf bank account details using my mobile banking app?

A. Watermaking
B. Blocking the use of external media
C. Print Blocking
D. Data Classification Blocking

A

C. Print Blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What stops me from printing on my home printer when accessing my work computer using RDP?

A. Watermarking
B. Blocking the use of external media
C. Restricted VDI
D. Data classification blocking

A

C. Restricted VDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ben has asked a colleague to collab on a project by connecting remotely to his desktop. What would prevent this from happening?

A. Remote Desktop
B. Protocol (RDP) Blocking
C. Clipboard privacy controls
D. Web Application Firewall

A

B. Protocol (RDP) Blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you reduce the risk of administrators installed unauthorized applications during RDP admin sessions?

A. Remote Desktop
B. Protocol (RDP) Blocking
C. Clipboard Privacy Controls
D. Web Application Firewall

A

C. Clipboard Privacy Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can I ensure that my sales team can send quotations and business contracts out to customers, but not send confidential company data?

A. Data classification blocking
B. Data loss detection
C. Watermarking
D. Clipboard privacy controls

A

A. Data classification blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The CISO needs to know who has been sharing signed out company confidential documents on a public web server. How can this be done?

A. Data classification blocking
B. Data loss detection
C. Watermarking
D. Clipboard privacy controls

A

C. Watermarking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jenny wants to share a useful business related video file with her colleague, but when Charles attempts to play it using the same player and codecs it cannot be viewed. What is most likely causing this?

A. DRM
B. Deep packet inspection
C. Network traffic analysis
D. Watermarking

A

A. DRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What allows a forensic investigator to discover the time and location that a digital image was taken?

A. Metadata
B. Obfuscation
C. Tokenization
D. Scrubbing

A

A. Metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What may have allowed a rogue administrator to remove evidence from the access logs?

A. Scrubbing
B. Metadata
C. Obfuscation
D. Tokenization

A

A. Scrubbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What stops the bank support desk personnel from accessing Ben’s 16-digit VISA card number and CVC code?

A. Metadata
B. Obfuscation
C. Key Pairs
D. Masking

A

D. Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What ensures that medical researchers cannot unwittingly share PHI Data from medical records?

A. Anonymization
B. Encryption
C. Metadata
D. Obfuscation

A

A. Anonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What allows an organization to manage business data from the moment it is stored to final destruction?

A. Data life cycle
B. Containers
C. Metadata
D. Storage area network

A

A. Data life cycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is another name for a bare metal hypervisor deployed in a data center?

A. Type 1
B. Emulation
C. Type 2
D. Containers

A

A. Type 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What allows the isolation of workloads allowing easy migration between vendor platforms?

A. Type 1
B. Emulation
C. Type 2
D. Containers

A

D. Containers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What allows Amy to play 16-bit Nintendo console games on her Windows desktop computer?

A. Emulation
B. Middleware
C. PaaS
D. Database storage

A

A. Emulation

17
Q

What allows a legacy Microsoft office application to run on Ben’s desktop alongside Microsoft Office 365 applications?

A. Application virtualization
B. Database storage
C. Middleware
D. PaaS

A

A. Application virtualization

18
Q

How can we make sure that when a user leaves the organization, we can re-assign their software licenses to the new user?

A. Deprovisioning
B. IaaS
C. Emulation
D. Off site backups

A

A. Deprovisioning

19
Q

What type of data is used to provide information about data?

A. Metadata
B. Indexes
C. Emulation
D. Off site backups

A

A. Metadata

20
Q

What is the primary reason that a small coffee shop business would choose a public cloud model?

A. Cost
B. Scalability
C. Resources
D. Location

A

A. Cost

21
Q

What type of cloud customer am I likely supporting if I am offering a private cloud and customers require that I have the FedRAMP attestation?

A. Government
B. Finance
C. Utility company
D. Small online retailer

A

A. Government

22
Q

What is used to describe the situation when multiple customers are hosted on a common hardware platform?

A. Multi-tenant
B. Platform sharing
C. Single tenant
D. Service model

A

A. Multi-tenant

23
Q

What type of cloud service model would be used when buying 50 licenses to access a customer relation management application?

A. SaaS
B. PaaS
C. IaaS
D. SecaaS

A

A. SaaS

24
Q

What type of cloud service model would be sued when I need to host my in house enterprise resource planning suite with a CSP?

A. SaaS
B. PaaS
C. IaaS
D. SecaaS

A

B. PaaS

25
Q

What type of cloud service model would be used when the Acme corporation needs to deploy and manage 500 VDI instances across four geographical regions?

A. SaaS
B. PaaS
C. IaaS
D. SecaaS

A

C. IaaS

26
Q

What will my CSP configure so that I have direct communication between multiple instances of VPC?

A. IPSec Tunnel
B. VPN
C. Inter-domain routing
D. VPC Peering

A

D. VPC Peering

27
Q

What kind of storage model would be best for images, files, video and audio streams?

A. File based storage
B. Database Storage
C. Block Storage
D. Blob Storage
E. Key value pairs

A

D. Blob Storage

28
Q

What king of storage model would be provided on a storage area network (SAN) ?

A. File based storage
B. Database Storage
C. Block Storage
D. Blob Storage
E. Key value pairs

A

C. Block Storage

29
Q

What kind of storage model would be useful when performing a compliance scan and the database could contain a series of identifiers and the actual value it is expecting to be set?

A. File based storage
B. Database Storage
C. Block Storage
D. Blob Storage
E. Key value pairs

A

E. Key value pairs

30
Q

What is used when a customer is considering their responsibility when buying in cloud services?

A. A cloud shared responsibility matrix
B. A cloud shared cost matrix
C. FedRAMP
D. Platform sharing

A

A. A cloud shared responsibility matrix