Chapter 3 Enterprise Data Security Mark B Flashcards
What security setting is it when Group Policy prevents my flash drive from being recognized by my Windows computer?
A. Watermarking
B. Blocking the use of external media
C. Print blocking
D. Data classification blocking
B. Blocking the use of external media
What stops me from capturingf bank account details using my mobile banking app?
A. Watermaking
B. Blocking the use of external media
C. Print Blocking
D. Data Classification Blocking
C. Print Blocking
What stops me from printing on my home printer when accessing my work computer using RDP?
A. Watermarking
B. Blocking the use of external media
C. Restricted VDI
D. Data classification blocking
C. Restricted VDI
Ben has asked a colleague to collab on a project by connecting remotely to his desktop. What would prevent this from happening?
A. Remote Desktop
B. Protocol (RDP) Blocking
C. Clipboard privacy controls
D. Web Application Firewall
B. Protocol (RDP) Blocking
How can you reduce the risk of administrators installed unauthorized applications during RDP admin sessions?
A. Remote Desktop
B. Protocol (RDP) Blocking
C. Clipboard Privacy Controls
D. Web Application Firewall
C. Clipboard Privacy Controls
How can I ensure that my sales team can send quotations and business contracts out to customers, but not send confidential company data?
A. Data classification blocking
B. Data loss detection
C. Watermarking
D. Clipboard privacy controls
A. Data classification blocking
The CISO needs to know who has been sharing signed out company confidential documents on a public web server. How can this be done?
A. Data classification blocking
B. Data loss detection
C. Watermarking
D. Clipboard privacy controls
C. Watermarking
Jenny wants to share a useful business related video file with her colleague, but when Charles attempts to play it using the same player and codecs it cannot be viewed. What is most likely causing this?
A. DRM
B. Deep packet inspection
C. Network traffic analysis
D. Watermarking
A. DRM
What allows a forensic investigator to discover the time and location that a digital image was taken?
A. Metadata
B. Obfuscation
C. Tokenization
D. Scrubbing
A. Metadata
What may have allowed a rogue administrator to remove evidence from the access logs?
A. Scrubbing
B. Metadata
C. Obfuscation
D. Tokenization
A. Scrubbing
What stops the bank support desk personnel from accessing Ben’s 16-digit VISA card number and CVC code?
A. Metadata
B. Obfuscation
C. Key Pairs
D. Masking
D. Masking
What ensures that medical researchers cannot unwittingly share PHI Data from medical records?
A. Anonymization
B. Encryption
C. Metadata
D. Obfuscation
A. Anonymization
What allows an organization to manage business data from the moment it is stored to final destruction?
A. Data life cycle
B. Containers
C. Metadata
D. Storage area network
A. Data life cycle
What is another name for a bare metal hypervisor deployed in a data center?
A. Type 1
B. Emulation
C. Type 2
D. Containers
A. Type 1
What allows the isolation of workloads allowing easy migration between vendor platforms?
A. Type 1
B. Emulation
C. Type 2
D. Containers
D. Containers
What allows Amy to play 16-bit Nintendo console games on her Windows desktop computer?
A. Emulation
B. Middleware
C. PaaS
D. Database storage
A. Emulation
What allows a legacy Microsoft office application to run on Ben’s desktop alongside Microsoft Office 365 applications?
A. Application virtualization
B. Database storage
C. Middleware
D. PaaS
A. Application virtualization
How can we make sure that when a user leaves the organization, we can re-assign their software licenses to the new user?
A. Deprovisioning
B. IaaS
C. Emulation
D. Off site backups
A. Deprovisioning
What type of data is used to provide information about data?
A. Metadata
B. Indexes
C. Emulation
D. Off site backups
A. Metadata
What is the primary reason that a small coffee shop business would choose a public cloud model?
A. Cost
B. Scalability
C. Resources
D. Location
A. Cost
What type of cloud customer am I likely supporting if I am offering a private cloud and customers require that I have the FedRAMP attestation?
A. Government
B. Finance
C. Utility company
D. Small online retailer
A. Government
What is used to describe the situation when multiple customers are hosted on a common hardware platform?
A. Multi-tenant
B. Platform sharing
C. Single tenant
D. Service model
A. Multi-tenant
What type of cloud service model would be used when buying 50 licenses to access a customer relation management application?
A. SaaS
B. PaaS
C. IaaS
D. SecaaS
A. SaaS
What type of cloud service model would be sued when I need to host my in house enterprise resource planning suite with a CSP?
A. SaaS
B. PaaS
C. IaaS
D. SecaaS
B. PaaS
What type of cloud service model would be used when the Acme corporation needs to deploy and manage 500 VDI instances across four geographical regions?
A. SaaS
B. PaaS
C. IaaS
D. SecaaS
C. IaaS
What will my CSP configure so that I have direct communication between multiple instances of VPC?
A. IPSec Tunnel
B. VPN
C. Inter-domain routing
D. VPC Peering
D. VPC Peering
What kind of storage model would be best for images, files, video and audio streams?
A. File based storage
B. Database Storage
C. Block Storage
D. Blob Storage
E. Key value pairs
D. Blob Storage
What king of storage model would be provided on a storage area network (SAN) ?
A. File based storage
B. Database Storage
C. Block Storage
D. Blob Storage
E. Key value pairs
C. Block Storage
What kind of storage model would be useful when performing a compliance scan and the database could contain a series of identifiers and the actual value it is expecting to be set?
A. File based storage
B. Database Storage
C. Block Storage
D. Blob Storage
E. Key value pairs
E. Key value pairs
What is used when a customer is considering their responsibility when buying in cloud services?
A. A cloud shared responsibility matrix
B. A cloud shared cost matrix
C. FedRAMP
D. Platform sharing
A. A cloud shared responsibility matrix