Section 20.196 Data Encryption Levels Flashcards

Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.

1
Q

Data Encryption

A

Process of converting data into a secret code to prevent unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Encryption Levels

Full-disk

A

Encrypts the entire hard drive to protect all of the data being stored on it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Partition

A

Similar to full-disk encryption but it is only applied to a specific partition
on the storage device

VeraCrypt: Tool that selectively encrypts partitions, like sensitive documents,
while leaving the OS partition unencrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Volume

A

Used to encrypt a set space on the storage medium

Creates an encrypted container that can house vario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

File-level Encryption

A

Used to encrypt an individual file instead of an entire partition or an
entire disk drive

GNU Privacy Guard: A tool that provides cryptographic privacy and authentication for data communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Database

A

● Secures the entire database

● Can extend the encryption across multiple storage devices or cloud storage

● Similar to full-disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Record

A

Encrypts individual records or rows within a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly