Filters
Question type

Study Flashcards

Trusting users to do key escrow is risky because ________.


A) the user may not do it
B) the user may not be able to find the key later
C) the user may refuse to give it up if fired
D) All of the above

Correct Answer

verifed

verified

A dual-layer DVD can hold up to about ________ GB.


A) 4
B) 8
C) 12
D) 64

Correct Answer

verifed

verified

Writing data to an array of hard drives has several advantages over writing to a single drive.

Correct Answer

verifed

verified

________ is the process of obscuring data such that it cannot identify a specific person, but remains practically useful.


A) DLP
B) PII
C) Data masking
D) None of the above

Correct Answer

verifed

verified

Data destruction is ________.


A) optional
B) necessary
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Databases are ________.


A) integrated collections of data
B) integrated collections of metadata
C) Neither A nor B
D) Both A and B

Correct Answer

verifed

verified

Companies address the risk of losing a security key by using ________.


A) encryption key resets
B) key escrow
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Normally, there is no limit on how long shadowing may maintain backed up files.

Correct Answer

verifed

verified

DRM usually is difficult to enforce.

Correct Answer

verifed

verified

File/directory data backup copies data, programs, configurations, and registry settings.

Correct Answer

verifed

verified

________ is an example of PII.


A) Individual database names
B) Social Security number
C) Process run to backup servers
D) None of the above

Correct Answer

verifed

verified

Regarding retention policies, firms need to ________.


A) implement strong and clear backup policies
B) specify how long data will be retained
C) ensure implementation is compliant with policies through periodic audits
D) All of the above

Correct Answer

verifed

verified

Image backup is a fast form of backups.

Correct Answer

verifed

verified

________ allows for very recent file changes to be restored.


A) Shadowing
B) File backup
C) File/folder backup
D) Image backup

Correct Answer

verifed

verified

Checkouts of backup media for restoration ________.


A) are very common
B) should be possible to be done immediately if the person checking out the tapes is an on-duty system administrator and signs out for the backup media.
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Retaining data can create negative consequences.

Correct Answer

verifed

verified

Profiling uses ________ to find patterns in a dataset which uniquely identify an individual.


A) statistical methods
B) algorithms and mathematics
C) All of the above.
D) None of the above

Correct Answer

verifed

verified

After wiping/clearing, data is ________.


A) recoverable
B) reusable
C) Both A and B
D) Neither A nor B

Correct Answer

verifed

verified

Another name for RAID 0 is ________.


A) Mirroring
B) Distributed Parity
C) Striping
D) None of the above

Correct Answer

verifed

verified

Most companies conduct full backups on a daily basis.

Correct Answer

verifed

verified

Showing 21 - 40 of 108

Related Exams

Show Answer