Data Security Flashcards

1
Q

Which of the following techniques is a built-in encryption system for Windows to protect
private information from unauthorized users who have physical access to a computer?

A

EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following RAID levels is referred to as “stripe of mirrors” that includes disk
striping and mirroring in a nested hybrid RAID level?

A

RAID Level 10
Blocks Striped and Mirrored: RAID 10 is a combination of RAID 0 (striping volume data) and RAID 1 (disk mirroring), and its implementation requires at least four drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Stephen, a security auditor, was hired to check whether the organization’s data is
plagiarism free and meets the organization’s needs and compliances. In this process,
Stephen implemented a security policy that defines a set of rules for storing and
maintaining the data for operational and regulatory purposes.

Which of the following security policies has Stephen implemented in the above scenario?

A

Data Retention Policy
Storing data securely for compliance or business requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly