Exam 9: Data Protection

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Image backup is a fast form of backups.

(True/False)
4.8/5
(33)

Writing data to an array of hard drives has several advantages over writing to a single drive.

(True/False)
4.8/5
(36)

Data destruction is ________.

(Multiple Choice)
4.7/5
(37)

File/directory data backup copies data, programs, configurations, and registry settings.

(True/False)
4.8/5
(34)

A dual-layer DVD can hold up to about ________ GB.

(Multiple Choice)
4.9/5
(32)

________ is the process of obscuring data such that it cannot identify a specific person, but remains practically useful.

(Multiple Choice)
4.9/5
(39)

________ is an example of PII.

(Multiple Choice)
4.9/5
(38)

Profiling uses ________ to find patterns in a dataset which uniquely identify an individual.

(Multiple Choice)
4.9/5
(34)

DRM usually is difficult to enforce.

(True/False)
4.7/5
(39)

Retaining data can create negative consequences.

(True/False)
4.9/5
(40)

Regarding retention policies, firms need to ________.

(Multiple Choice)
4.7/5
(36)

Another name for RAID 0 is ________.

(Multiple Choice)
4.7/5
(43)

Checkouts of backup media for restoration ________.

(Multiple Choice)
4.9/5
(29)

________ allows for very recent file changes to be restored.

(Multiple Choice)
4.9/5
(42)

After wiping/clearing, data is ________.

(Multiple Choice)
4.8/5
(34)

Databases are ________.

(Multiple Choice)
4.7/5
(32)

Trusting users to do key escrow is risky because ________.

(Multiple Choice)
4.7/5
(30)

Companies address the risk of losing a security key by using ________.

(Multiple Choice)
4.9/5
(35)

Most companies conduct full backups on a daily basis.

(True/False)
4.8/5
(28)

Normally, there is no limit on how long shadowing may maintain backed up files.

(True/False)
4.8/5
(32)
Showing 21 - 40 of 108
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)