Chapter 3 Enterprise Data Security Mark B Flashcards
What security setting is it when Group Policy prevents my flash drive from being recognized by my Windows computer?
A. Watermarking
B. Blocking the use of external media
C. Print blocking
D. Data classification blocking
B. Blocking the use of external media
What stops me from capturingf bank account details using my mobile banking app?
A. Watermaking
B. Blocking the use of external media
C. Print Blocking
D. Data Classification Blocking
C. Print Blocking
What stops me from printing on my home printer when accessing my work computer using RDP?
A. Watermarking
B. Blocking the use of external media
C. Restricted VDI
D. Data classification blocking
C. Restricted VDI
Ben has asked a colleague to collab on a project by connecting remotely to his desktop. What would prevent this from happening?
A. Remote Desktop
B. Protocol (RDP) Blocking
C. Clipboard privacy controls
D. Web Application Firewall
B. Protocol (RDP) Blocking
How can you reduce the risk of administrators installed unauthorized applications during RDP admin sessions?
A. Remote Desktop
B. Protocol (RDP) Blocking
C. Clipboard Privacy Controls
D. Web Application Firewall
C. Clipboard Privacy Controls
How can I ensure that my sales team can send quotations and business contracts out to customers, but not send confidential company data?
A. Data classification blocking
B. Data loss detection
C. Watermarking
D. Clipboard privacy controls
A. Data classification blocking
The CISO needs to know who has been sharing signed out company confidential documents on a public web server. How can this be done?
A. Data classification blocking
B. Data loss detection
C. Watermarking
D. Clipboard privacy controls
C. Watermarking
Jenny wants to share a useful business related video file with her colleague, but when Charles attempts to play it using the same player and codecs it cannot be viewed. What is most likely causing this?
A. DRM
B. Deep packet inspection
C. Network traffic analysis
D. Watermarking
A. DRM
What allows a forensic investigator to discover the time and location that a digital image was taken?
A. Metadata
B. Obfuscation
C. Tokenization
D. Scrubbing
A. Metadata
What may have allowed a rogue administrator to remove evidence from the access logs?
A. Scrubbing
B. Metadata
C. Obfuscation
D. Tokenization
A. Scrubbing
What stops the bank support desk personnel from accessing Ben’s 16-digit VISA card number and CVC code?
A. Metadata
B. Obfuscation
C. Key Pairs
D. Masking
D. Masking
What ensures that medical researchers cannot unwittingly share PHI Data from medical records?
A. Anonymization
B. Encryption
C. Metadata
D. Obfuscation
A. Anonymization
What allows an organization to manage business data from the moment it is stored to final destruction?
A. Data life cycle
B. Containers
C. Metadata
D. Storage area network
A. Data life cycle
What is another name for a bare metal hypervisor deployed in a data center?
A. Type 1
B. Emulation
C. Type 2
D. Containers
A. Type 1
What allows the isolation of workloads allowing easy migration between vendor platforms?
A. Type 1
B. Emulation
C. Type 2
D. Containers
D. Containers