Data Security Flashcards
Which of the following techniques is a built-in encryption system for Windows to protect
private information from unauthorized users who have physical access to a computer?
EFS
Which of the following RAID levels is referred to as “stripe of mirrors” that includes disk
striping and mirroring in a nested hybrid RAID level?
RAID Level 10
Blocks Striped and Mirrored: RAID 10 is a combination of RAID 0 (striping volume data) and RAID 1 (disk mirroring), and its implementation requires at least four drives.
Stephen, a security auditor, was hired to check whether the organization’s data is
plagiarism free and meets the organization’s needs and compliances. In this process,
Stephen implemented a security policy that defines a set of rules for storing and
maintaining the data for operational and regulatory purposes.
Which of the following security policies has Stephen implemented in the above scenario?
Data Retention Policy
Storing data securely for compliance or business requirements.