Deck 9: Data Protection

Full screen (f)
exit full mode
Question
________ is raw facts; ________ is meaning extracted from the ________.

A) Data; information; data
B) Information; information; data
C) Information; data; information
D) Data; information; information
Use Space or
up arrow
down arrow
to flip the card.
Question
The full cost of the Target data breach is estimated at ________.

A) $560 million
B) $890 million
C) $2 billion
D) $7 billion
Question
Attacks on data can happen when it's being stored but not when it's being processed.
Question
________ refers to ensuring that copies of data files are stored safely and securely and will survive even if data is lost or damaged.

A) Information
B) Data
C) Restoration
D) Storage
Question
The amount of information on a hard drive that is backed up is referred to as ________.

A) image backup
B) backup
C) backup scope
D) file/directory backup
Question
Which of the following is the most common type of backup?

A) A file/directory data backup
B) An image backup
C) Shadowing
D) An incremental backup
Question
Which of the following is the most common type of backup?

A) A file/directory data backup
B) An image backup
C) Shadowing
D) An incremental backup
Question
Which of the following is often known as being completed just one time per week?

A) A file/directory data backup
B) An image backup
C) A full backup
D) An incremental backup
Question
Which of the following is known to be backing up when a file is being worked on?

A) An incremental backup
B) An image backup
C) Shadowing
D) A file/directory data backup
Question
Which of the following is FALSE about periodic full backups and more frequent incremental backups?

A) Incremental backups take less time.
B) Restoration is easy for incremental backups.
C) Most companies mix full and incremental backups.
D) Incremental backups must be careful when restoring.
Question
Compared to local backup, centralized backup ________.

A) makes it easier to know if backup policies are being followed
B) allows for a wide distributed system of backup within a company
C) requires that every hard drive have backup capabilities
D) requires that all PCs have backup hardware
Question
If a company has two servers, ________ is an option for backup in which each site backs up the other site.

A) mesh backup
B) centralized backup
C) continuous data protection
D) local backup
Question
An image backup is one of the fastest methods of backing a hard drive.
Question
Several weeks of backups are typically kept of incremental backups.
Question
Magnetic tape is ________.

A) very fast
B) very expensive to use
C) able to store vast amounts of data at the lowest cost per bit
D) is still very popular due to its speed
Question
________ refers to storing backed-up data for extended periods of time.

A) Archiving
B) Disk arraying
C) RAID
D) CDP
Question
There is some research that suggests that DVD or Blu-ray storage of longer than ________ may be problematic.

A) three months
B) one year
C) 15 months
D) two years
Question
If you have a store media that can hold vast amounts of data, is very slow, and has a low cost, you likely have ________.

A) Blu-ray
B) DVDs
C) magnetic tape
D) RAID
Question
Blu-ray disks can hold ________ GB of data.

A) 8
B) 12 to 56
C) 50 to 128
D) 85 to 120
Question
RAID 0, writing data across multiple disks, is known as ________.

A) mirroring
B) striping
C) CDP
D) mesh backup
Question
With RAID 1, ________ is achieved.

A) mirroring
B) striping
C) CDP
D) redundancy
Question
No striping is used in ________.

A) RAID 1
B) RAID 0
C) CDP
D) RPO
Question
With RAID 5, reliability is provided by ________

A) parity bits
B) RPO
C) CDP
D) redundancy
Question
________ is the time required to recover from a disaster and restore normal operations.

A) CDP
B) RPO
C) RAID 1
D) RAID 0
Question
A ________ configuration shortens a firm's recovery time objective.

A) RAID 5
B) RPO
C) RAID 1
D) RAID 0
Question
A good way to get both reliability and fast data transfer speeds it to use a(n) ________ configuration.

A) RAID 5
B) RPO
C) RAID 1
D) RAID 0
Question
A RAID 5 configuration can recover from a single-drive failure, but not a multidrive failure.
Question
High reliability and fast data transfer rates are easily achieved with RAID 1.
Question
A RAID 5 configuration can recover from a single-drive failure, but not a multidrive failure.
Question
Corporations require short RPO.
Question
Corporations require short RTOs.
Question
Parity bits can be stored on the same disk with their corresponding parts.
Question
Parity bits are analogous to the parts used to reconstruct the inventory in a destroyed warehouse.
Question
An essential part of backup media policies is to ensure that backup media ________.

A) is moved offsite
B) stays onsite
C) stays on the same local hard drive of which it backed up
D) is stored onsite in a safe
Question
Company policies should mandate that all backup media should ________.

A) always be stored onside
B) be encrypted
C) be backed up two additional times
D) be backed up one additional time
Question
Checkouts of backup media for restoration ________.

A) should not require a written permission so employees can easily have access to the data
B) should require written permission of the CEO of the company
C) should require written permission of the IT manager
D) should require written permission of the manager of the person wishing to access the backup
Question
The coordinated use of online storage and backup for messages is referred to as ________.

A) mirroring
B) striping
C) retention
D) redundancy
Question
Courts have consistently ruled that if archives exist, companies under discovery orders must ________.

A) use their own money to create programs to sort through the archives
B) produce all archived messages at the expense of the state
C) produce all archived messages at the expense of the federal government
D) be allowed to delete all archived messages
Question
________ can be used to dredge up messages in which an employee has said something
Embarrassing or even obviously illegal.

A) The archiving process
B) Striping
C) Retention
D) The discovery process
Question
A ________ provides strong access control, including authentication of suitable strength, authorizations, and auditing.

A) vault server
B) RAID 1
C) registry setting
D) CDP
Question
Backup management and good policies begin with an understanding of the current system and future needs.
Question
Retention decisions in most companies is a moot point since it is standard to store incremental and full backups for 10 years.
Question
Companies should implement periodic audits to make sure their company is complying with policies.
Question
________ is an integrated collection of data.

A) Information
B) A database
C) A vault server
D) RAID 5
Question
Which of the following is NOT an accreditation standard?

A) HIPAA
B) CobiT
C) PCI-DSS
D) PKI
Question
Relations in a database are commonly called ________.

A) entities
B) tables
C) objects
D) attributes
Question
________ are types of objects that represent persons, places, things, or events.

A) Entities
B) Tables
C) Tuples
D) Rows
Question
A row in a database is also known as a(n) ________.

A) entity
B) table
C) tuple
D) object
Question
Which of the following is NOT a DBMS?

A) SQL Server
B) DBAN
C) Oracle
D) MySQL
Question
________ are pieces of SQL code that are automatically run when changes are made to a database.

A) Triggers
B) HSMs
C) Data models
D) SQL injections
Question
________ can be used to produce automatic responses if data have been altered.

A) DDL triggers
B) DML triggers
C) SQL code
D) Mirroring
Question
________ can be used to produce automatic responses if the structure of the database has been altered.

A) DDL triggers
B) DML triggers
C) SQL code
D) Mirroring
Question
A simple yet effective way of discouraging attackers from accessing a database is to change the default ________.

A) DDL triggers
B) listening port
C) DML triggers
D) SQL code
Question
It is important that data stored in a database not be cryptographically protected.
Question
Applications that access databases must be secured.
Question
Encryption is desirable, but it makes sharing more difficult.
Question
________ is an example of PII.

A) A database record number
B) A data bit
C) SQL code
D) A social security number
Question
Which of the following is NOT listed by the National Institute of Standards and Technology as PII?

A) Address information
B) Personal characteristics
C) Name
D) Database row number
Question
________ obscures data such that it cannot identify a specific person but the data remains useful.

A) Data masking
B) Watermarking
C) A listening port
D) Profiling
Question
________ uses statistical methods, algorithms, and mathematics to find patterns in a data set that uniquely identify an individual.

A) Data masking
B) Profiling
C) Triangulation
D) Mirroring
Question
________ can filter all incoming and outgoing content including e-mail and instant messaging.

A) DLP systems
B) Linking attributes
C) DBMS systems
D) DRM
Question
Data destruction is considered ________.

A) inevitable
B) optional
C) frequent
D) routine
Question
The most common form of deletion in Windows-based systems is ________.

A) nominal deletion
B) basic file deletion
C) wiping
D) clearing
Question
________ happens when, on a Windows system, you empty the Recycle Bin.

A) Nominal deletion
B) Basic file deletion
C) Wiping
D) Clearing
Question
________ is logically and physically erasing data so that it is unrecoverable.

A) Nominal deletion
B) Basic file deletion
C) Wiping
D) Mirroring
Question
Typically, DRM is fairly easy to enforce.
Question
For most companies, attempts to reduce unauthorized data transfers have proven fairly easy.
Question
Nominal deletion happens when you select a file and then press the delete key.
Question
For media, the best approach seems to be physical shredding.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/69
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Data Protection
1
________ is raw facts; ________ is meaning extracted from the ________.

A) Data; information; data
B) Information; information; data
C) Information; data; information
D) Data; information; information
Data; information; data
2
The full cost of the Target data breach is estimated at ________.

A) $560 million
B) $890 million
C) $2 billion
D) $7 billion
$7 billion
3
Attacks on data can happen when it's being stored but not when it's being processed.
False
4
________ refers to ensuring that copies of data files are stored safely and securely and will survive even if data is lost or damaged.

A) Information
B) Data
C) Restoration
D) Storage
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
5
The amount of information on a hard drive that is backed up is referred to as ________.

A) image backup
B) backup
C) backup scope
D) file/directory backup
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is the most common type of backup?

A) A file/directory data backup
B) An image backup
C) Shadowing
D) An incremental backup
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is the most common type of backup?

A) A file/directory data backup
B) An image backup
C) Shadowing
D) An incremental backup
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is often known as being completed just one time per week?

A) A file/directory data backup
B) An image backup
C) A full backup
D) An incremental backup
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is known to be backing up when a file is being worked on?

A) An incremental backup
B) An image backup
C) Shadowing
D) A file/directory data backup
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is FALSE about periodic full backups and more frequent incremental backups?

A) Incremental backups take less time.
B) Restoration is easy for incremental backups.
C) Most companies mix full and incremental backups.
D) Incremental backups must be careful when restoring.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
11
Compared to local backup, centralized backup ________.

A) makes it easier to know if backup policies are being followed
B) allows for a wide distributed system of backup within a company
C) requires that every hard drive have backup capabilities
D) requires that all PCs have backup hardware
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
12
If a company has two servers, ________ is an option for backup in which each site backs up the other site.

A) mesh backup
B) centralized backup
C) continuous data protection
D) local backup
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
13
An image backup is one of the fastest methods of backing a hard drive.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
14
Several weeks of backups are typically kept of incremental backups.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
15
Magnetic tape is ________.

A) very fast
B) very expensive to use
C) able to store vast amounts of data at the lowest cost per bit
D) is still very popular due to its speed
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
16
________ refers to storing backed-up data for extended periods of time.

A) Archiving
B) Disk arraying
C) RAID
D) CDP
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
17
There is some research that suggests that DVD or Blu-ray storage of longer than ________ may be problematic.

A) three months
B) one year
C) 15 months
D) two years
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
18
If you have a store media that can hold vast amounts of data, is very slow, and has a low cost, you likely have ________.

A) Blu-ray
B) DVDs
C) magnetic tape
D) RAID
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
19
Blu-ray disks can hold ________ GB of data.

A) 8
B) 12 to 56
C) 50 to 128
D) 85 to 120
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
20
RAID 0, writing data across multiple disks, is known as ________.

A) mirroring
B) striping
C) CDP
D) mesh backup
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
21
With RAID 1, ________ is achieved.

A) mirroring
B) striping
C) CDP
D) redundancy
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
22
No striping is used in ________.

A) RAID 1
B) RAID 0
C) CDP
D) RPO
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
23
With RAID 5, reliability is provided by ________

A) parity bits
B) RPO
C) CDP
D) redundancy
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
24
________ is the time required to recover from a disaster and restore normal operations.

A) CDP
B) RPO
C) RAID 1
D) RAID 0
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
25
A ________ configuration shortens a firm's recovery time objective.

A) RAID 5
B) RPO
C) RAID 1
D) RAID 0
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
26
A good way to get both reliability and fast data transfer speeds it to use a(n) ________ configuration.

A) RAID 5
B) RPO
C) RAID 1
D) RAID 0
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
27
A RAID 5 configuration can recover from a single-drive failure, but not a multidrive failure.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
28
High reliability and fast data transfer rates are easily achieved with RAID 1.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
29
A RAID 5 configuration can recover from a single-drive failure, but not a multidrive failure.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
30
Corporations require short RPO.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
31
Corporations require short RTOs.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
32
Parity bits can be stored on the same disk with their corresponding parts.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
33
Parity bits are analogous to the parts used to reconstruct the inventory in a destroyed warehouse.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
34
An essential part of backup media policies is to ensure that backup media ________.

A) is moved offsite
B) stays onsite
C) stays on the same local hard drive of which it backed up
D) is stored onsite in a safe
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
35
Company policies should mandate that all backup media should ________.

A) always be stored onside
B) be encrypted
C) be backed up two additional times
D) be backed up one additional time
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
36
Checkouts of backup media for restoration ________.

A) should not require a written permission so employees can easily have access to the data
B) should require written permission of the CEO of the company
C) should require written permission of the IT manager
D) should require written permission of the manager of the person wishing to access the backup
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
37
The coordinated use of online storage and backup for messages is referred to as ________.

A) mirroring
B) striping
C) retention
D) redundancy
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
38
Courts have consistently ruled that if archives exist, companies under discovery orders must ________.

A) use their own money to create programs to sort through the archives
B) produce all archived messages at the expense of the state
C) produce all archived messages at the expense of the federal government
D) be allowed to delete all archived messages
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
39
________ can be used to dredge up messages in which an employee has said something
Embarrassing or even obviously illegal.

A) The archiving process
B) Striping
C) Retention
D) The discovery process
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
40
A ________ provides strong access control, including authentication of suitable strength, authorizations, and auditing.

A) vault server
B) RAID 1
C) registry setting
D) CDP
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
41
Backup management and good policies begin with an understanding of the current system and future needs.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
42
Retention decisions in most companies is a moot point since it is standard to store incremental and full backups for 10 years.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
43
Companies should implement periodic audits to make sure their company is complying with policies.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
44
________ is an integrated collection of data.

A) Information
B) A database
C) A vault server
D) RAID 5
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is NOT an accreditation standard?

A) HIPAA
B) CobiT
C) PCI-DSS
D) PKI
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
46
Relations in a database are commonly called ________.

A) entities
B) tables
C) objects
D) attributes
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
47
________ are types of objects that represent persons, places, things, or events.

A) Entities
B) Tables
C) Tuples
D) Rows
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
48
A row in a database is also known as a(n) ________.

A) entity
B) table
C) tuple
D) object
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
49
Which of the following is NOT a DBMS?

A) SQL Server
B) DBAN
C) Oracle
D) MySQL
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
50
________ are pieces of SQL code that are automatically run when changes are made to a database.

A) Triggers
B) HSMs
C) Data models
D) SQL injections
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
51
________ can be used to produce automatic responses if data have been altered.

A) DDL triggers
B) DML triggers
C) SQL code
D) Mirroring
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
52
________ can be used to produce automatic responses if the structure of the database has been altered.

A) DDL triggers
B) DML triggers
C) SQL code
D) Mirroring
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
53
A simple yet effective way of discouraging attackers from accessing a database is to change the default ________.

A) DDL triggers
B) listening port
C) DML triggers
D) SQL code
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
54
It is important that data stored in a database not be cryptographically protected.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
55
Applications that access databases must be secured.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
56
Encryption is desirable, but it makes sharing more difficult.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
57
________ is an example of PII.

A) A database record number
B) A data bit
C) SQL code
D) A social security number
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following is NOT listed by the National Institute of Standards and Technology as PII?

A) Address information
B) Personal characteristics
C) Name
D) Database row number
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
59
________ obscures data such that it cannot identify a specific person but the data remains useful.

A) Data masking
B) Watermarking
C) A listening port
D) Profiling
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
60
________ uses statistical methods, algorithms, and mathematics to find patterns in a data set that uniquely identify an individual.

A) Data masking
B) Profiling
C) Triangulation
D) Mirroring
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
61
________ can filter all incoming and outgoing content including e-mail and instant messaging.

A) DLP systems
B) Linking attributes
C) DBMS systems
D) DRM
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
62
Data destruction is considered ________.

A) inevitable
B) optional
C) frequent
D) routine
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
63
The most common form of deletion in Windows-based systems is ________.

A) nominal deletion
B) basic file deletion
C) wiping
D) clearing
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
64
________ happens when, on a Windows system, you empty the Recycle Bin.

A) Nominal deletion
B) Basic file deletion
C) Wiping
D) Clearing
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
65
________ is logically and physically erasing data so that it is unrecoverable.

A) Nominal deletion
B) Basic file deletion
C) Wiping
D) Mirroring
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
66
Typically, DRM is fairly easy to enforce.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
67
For most companies, attempts to reduce unauthorized data transfers have proven fairly easy.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
68
Nominal deletion happens when you select a file and then press the delete key.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
69
For media, the best approach seems to be physical shredding.
Unlock Deck
Unlock for access to all 69 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 69 flashcards in this deck.