Deck 9: Data Protection

Full screen (f)
exit full mode
Question
Image backup is attractive because ________.

A) it requires minimal additional work to restore a fully functioning PC
B) it is faster than file/directory backup
C) it takes up less storage space than file/directory backup
D) Both A and C
Use Space or
up arrow
down arrow
to flip the card.
Question
With image backup, even if the entire hard drive is lost, its content can be restored onto the same machine or a different machine.
Question
Properly hardened hosts and securely coded applications can help protect data while it is processed.
Question
Properly hardened hosts and securely coded applications can help protect data while it is transmitted.
Question
Data is the principal element of any information system.
Question
Typically, the shadow storage space is nearly unlimited.
Question
File/directory data backup copies ________.

A) programs
B) data
C) registry settings
D) Both A and B.
Question
Using a secure cryptographic system can prevent attacks while data is being processed.
Question
File/directory backup is slower and takes up more storage space than image backup.
Question
Typically, having enough shadow backup space for a few days is sufficient.
Question
The process of keeping a backup copy of each file being worked on by backing it up every few minutes is called ________.

A) file backup
B) file/folder backup
C) image backup
D) shadowing
Question
Normally, there is no limit on how long shadowing may maintain backed up files.
Question
Properly backed up data includes ________.

A) ensuring that copies of data files are stored safely and secured
B) ensuring that copies of data files will survive even if the data on the host are lost and damaged
C) Both A and B
D) Neither A nor B
Question
Companies usually conduct full backups on a ________ basis.

A) hourly
B) daily
C) weekly
D) monthly
Question
Using a secure cryptographic system can prevent attacks while data is being transmitted.
Question
Image backup is a fast form of backups.
Question
File/directory data backup copies data, programs, configurations, and registry settings.
Question
________ allows for very recent file changes to be restored.

A) Shadowing
B) File backup
C) File/folder backup
D) Image backup
Question
Another name for data is raw facts.
Question
Data can be lost by ________.

A) mechanical failure
B) environmental casualties
C) malware
D) All of the above
Question
CDP requires expensive high-speed transmission link between the sites.
Question
Two computer systems each back up the other in real time in ________.

A) CDP
B) full duplex backup
C) full backup
D) All of the above
Question
CDP is inexpensive to use.
Question
Magnetic tape can store large amounts of data at the lowest cost per bit of any backup medium.
Question
Backup onto another hard drive is a very slow method of backup.
Question
Backed-up data must be physically stored on something.
Question
Mesh backup is where client PCs in an organization back up each other.
Question
Full backups are ________.

A) performed on all files and directories
B) slow
C) typically done weekly
D) All of the above
Question
Incremental and full backups must be restored in the order in which they were created.
Question
Most companies conduct full backups on a daily basis.
Question
With centralized backup, each location backs up the other in real time.
Question
Compared to local backup, centralized backup ________.

A) is more capable of enforcing backup policy
B) is more capable of auditing backup policy
C) Both A and B
D) Neither A nor B
Question
Magnetic tape is ________.

A) expensive to use
B) very fast
C) Both A and B
D) Neither A nor B
Question
Differential backups only back up data that has changed since the most recent full backup.
Question
With CDP, each location backs up the other in real time.
Question
Incremental backups are usually discarded after the next full backup.
Question
Backing up data to a second hard drive on a computer is more expensive than backup onto to magnetic tape.
Question
With local backup processes, policies are easily enforced.
Question
Incremental and full backups may be restored out of order in which they were created.
Question
________ backups only back up data that has changed since the most recent full backup.

A) Differential
B) Incremental
C) Delta
D) None of the above
Question
In the long term, backup media should be stored at a different site.
Question
Another name for RAID 5 is ________.

A) Mirroring
B) Distributed Parity
C) Striping
D) None of the above.
Question
A system using an array of drives increases reliability.
Question
Writing data to an array of hard drives has several advantages over writing to a single drive.
Question
Optical disks can safely hold data for decades.
Question
Retaining data can create negative consequences.
Question
Regarding retention policies, firms need to ________.

A) implement strong and clear backup policies
B) specify how long data will be retained
C) ensure implementation is compliant with policies through periodic audits
D) All of the above
Question
With RAID 1, the following is achieved ________.

A) Redundancy
B) Striping
C) Both A and B.
D) Neither A nor B.
Question
Another name for RAID 0 is ________.

A) Mirroring
B) Distributed Parity
C) Striping
D) None of the above
Question
Another name for RAID 1 is ________.

A) Mirroring
B) Distributed Parity
C) Striping
D) None of the above
Question
Configuring multiple hard drives as an array within a single system is ________.

A) a common method of increasing reliability
B) a common method of increasing speed
C) Both A and B
D) Neither A nor B
Question
Backup media should be encrypted.
Question
Checkouts of backup media for restoration ________.

A) are very common
B) should be possible to be done immediately if the person checking out the tapes is an on-duty system administrator and signs out for the backup media.
C) Both A and B
D) Neither A nor B
Question
From a legal standpoint, loss of encrypted data comes with negligible risk from the loss private information.
Question
With RAID 5, the following is achieved ________.

A) Parity
B) Striping
C) Redundancy
D) All of the above
Question
Backup policies should be audited regularly and include tracing what happens in samples of data.
Question
Backup creation policies should specify ________.

A) what data should be backed up
B) backup restoration tests
C) Both A and B
D) Neither A nor B
Question
Who should be involved in the creation of retention policies?

A) Business units
B) The legal department
C) Both A and B
D) Neither A nor B
Question
A dual-layer DVD can hold up to about ________ GB.

A) 4
B) 8
C) 12
D) 64
Question
Policies should not require that backup data be encrypted.
Question
Example of DBMSs include ________.

A) MySQL, Oracle
B) IBM DB2, Microsoft SQL Server
C) A only
D) Both A and B
Question
In relational database, an attribute is the same as a tuple or record.
Question
DML triggers are used to ________.

A) maliciously attack databases
B) produce automatic responses if the data of the database has been altered.
C) Both A and B
D) Neither A nor B
Question
Sanitation can protect against SQL injection attacks.
Question
DDL triggers are used to ________.

A) maliciously attack databases
B) produce automatic responses if the structure of the database has been altered.
C) Both A and B.
D) Neither A nor B.
Question
When performing trend analysis, increasing granularity in queries is desirable.
Question
Most databases are relational databases.
Question
Databases are ________.

A) integrated collections of data
B) integrated collections of metadata
C) Neither A nor B
D) Both A and B
Question
In relational database, a row is the same as a tuple or record.
Question
DML triggers are used to ________.

A) maliciously attack databases
B) produce automatic responses if the structure of the database has been altered.
C) Both A and B
D) Neither A nor B
Question
Validation can protect against SQL injection attacks.
Question
Training users what not to put into e-mail messages is the most effective method of avoiding problems during the legal discovery process.
Question
Triggers are damaging code that attackers use to destroy databases.
Question
In relational database, a row is different from a record.
Question
Technology is the most effective method of avoiding problems during the legal discovery process.
Question
Retaining data can be ________.

A) expensive
B) susceptible to discovery of damaging information
C) A only
D) Both A and B
Question
Which of the following database events should be regularly audited?

A) Warnings and exceptions
B) Special access and logins
C) Changes
D) All of the above
Question
Spreadsheets are rarely the subject of compliance regulations.
Question
In a relational database, examples of entities include ________.

A) persons
B) things
C) events
D) All of the above
Question
When performing trend analysis, decreasing granularity in queries is desirable.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/108
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Data Protection
1
Image backup is attractive because ________.

A) it requires minimal additional work to restore a fully functioning PC
B) it is faster than file/directory backup
C) it takes up less storage space than file/directory backup
D) Both A and C
A
2
With image backup, even if the entire hard drive is lost, its content can be restored onto the same machine or a different machine.
True
3
Properly hardened hosts and securely coded applications can help protect data while it is processed.
True
4
Properly hardened hosts and securely coded applications can help protect data while it is transmitted.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
5
Data is the principal element of any information system.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
6
Typically, the shadow storage space is nearly unlimited.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
7
File/directory data backup copies ________.

A) programs
B) data
C) registry settings
D) Both A and B.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
8
Using a secure cryptographic system can prevent attacks while data is being processed.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
9
File/directory backup is slower and takes up more storage space than image backup.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
10
Typically, having enough shadow backup space for a few days is sufficient.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
11
The process of keeping a backup copy of each file being worked on by backing it up every few minutes is called ________.

A) file backup
B) file/folder backup
C) image backup
D) shadowing
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
12
Normally, there is no limit on how long shadowing may maintain backed up files.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
13
Properly backed up data includes ________.

A) ensuring that copies of data files are stored safely and secured
B) ensuring that copies of data files will survive even if the data on the host are lost and damaged
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
14
Companies usually conduct full backups on a ________ basis.

A) hourly
B) daily
C) weekly
D) monthly
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
15
Using a secure cryptographic system can prevent attacks while data is being transmitted.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
16
Image backup is a fast form of backups.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
17
File/directory data backup copies data, programs, configurations, and registry settings.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
18
________ allows for very recent file changes to be restored.

A) Shadowing
B) File backup
C) File/folder backup
D) Image backup
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
19
Another name for data is raw facts.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
20
Data can be lost by ________.

A) mechanical failure
B) environmental casualties
C) malware
D) All of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
21
CDP requires expensive high-speed transmission link between the sites.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
22
Two computer systems each back up the other in real time in ________.

A) CDP
B) full duplex backup
C) full backup
D) All of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
23
CDP is inexpensive to use.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
24
Magnetic tape can store large amounts of data at the lowest cost per bit of any backup medium.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
25
Backup onto another hard drive is a very slow method of backup.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
26
Backed-up data must be physically stored on something.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
27
Mesh backup is where client PCs in an organization back up each other.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
28
Full backups are ________.

A) performed on all files and directories
B) slow
C) typically done weekly
D) All of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
29
Incremental and full backups must be restored in the order in which they were created.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
30
Most companies conduct full backups on a daily basis.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
31
With centralized backup, each location backs up the other in real time.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
32
Compared to local backup, centralized backup ________.

A) is more capable of enforcing backup policy
B) is more capable of auditing backup policy
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
33
Magnetic tape is ________.

A) expensive to use
B) very fast
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
34
Differential backups only back up data that has changed since the most recent full backup.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
35
With CDP, each location backs up the other in real time.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
36
Incremental backups are usually discarded after the next full backup.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
37
Backing up data to a second hard drive on a computer is more expensive than backup onto to magnetic tape.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
38
With local backup processes, policies are easily enforced.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
39
Incremental and full backups may be restored out of order in which they were created.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
40
________ backups only back up data that has changed since the most recent full backup.

A) Differential
B) Incremental
C) Delta
D) None of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
41
In the long term, backup media should be stored at a different site.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
42
Another name for RAID 5 is ________.

A) Mirroring
B) Distributed Parity
C) Striping
D) None of the above.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
43
A system using an array of drives increases reliability.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
44
Writing data to an array of hard drives has several advantages over writing to a single drive.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
45
Optical disks can safely hold data for decades.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
46
Retaining data can create negative consequences.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
47
Regarding retention policies, firms need to ________.

A) implement strong and clear backup policies
B) specify how long data will be retained
C) ensure implementation is compliant with policies through periodic audits
D) All of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
48
With RAID 1, the following is achieved ________.

A) Redundancy
B) Striping
C) Both A and B.
D) Neither A nor B.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
49
Another name for RAID 0 is ________.

A) Mirroring
B) Distributed Parity
C) Striping
D) None of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
50
Another name for RAID 1 is ________.

A) Mirroring
B) Distributed Parity
C) Striping
D) None of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
51
Configuring multiple hard drives as an array within a single system is ________.

A) a common method of increasing reliability
B) a common method of increasing speed
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
52
Backup media should be encrypted.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
53
Checkouts of backup media for restoration ________.

A) are very common
B) should be possible to be done immediately if the person checking out the tapes is an on-duty system administrator and signs out for the backup media.
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
54
From a legal standpoint, loss of encrypted data comes with negligible risk from the loss private information.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
55
With RAID 5, the following is achieved ________.

A) Parity
B) Striping
C) Redundancy
D) All of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
56
Backup policies should be audited regularly and include tracing what happens in samples of data.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
57
Backup creation policies should specify ________.

A) what data should be backed up
B) backup restoration tests
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
58
Who should be involved in the creation of retention policies?

A) Business units
B) The legal department
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
59
A dual-layer DVD can hold up to about ________ GB.

A) 4
B) 8
C) 12
D) 64
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
60
Policies should not require that backup data be encrypted.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
61
Example of DBMSs include ________.

A) MySQL, Oracle
B) IBM DB2, Microsoft SQL Server
C) A only
D) Both A and B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
62
In relational database, an attribute is the same as a tuple or record.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
63
DML triggers are used to ________.

A) maliciously attack databases
B) produce automatic responses if the data of the database has been altered.
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
64
Sanitation can protect against SQL injection attacks.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
65
DDL triggers are used to ________.

A) maliciously attack databases
B) produce automatic responses if the structure of the database has been altered.
C) Both A and B.
D) Neither A nor B.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
66
When performing trend analysis, increasing granularity in queries is desirable.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
67
Most databases are relational databases.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
68
Databases are ________.

A) integrated collections of data
B) integrated collections of metadata
C) Neither A nor B
D) Both A and B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
69
In relational database, a row is the same as a tuple or record.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
70
DML triggers are used to ________.

A) maliciously attack databases
B) produce automatic responses if the structure of the database has been altered.
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
71
Validation can protect against SQL injection attacks.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
72
Training users what not to put into e-mail messages is the most effective method of avoiding problems during the legal discovery process.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
73
Triggers are damaging code that attackers use to destroy databases.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
74
In relational database, a row is different from a record.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
75
Technology is the most effective method of avoiding problems during the legal discovery process.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
76
Retaining data can be ________.

A) expensive
B) susceptible to discovery of damaging information
C) A only
D) Both A and B
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
77
Which of the following database events should be regularly audited?

A) Warnings and exceptions
B) Special access and logins
C) Changes
D) All of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
78
Spreadsheets are rarely the subject of compliance regulations.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
79
In a relational database, examples of entities include ________.

A) persons
B) things
C) events
D) All of the above
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
80
When performing trend analysis, decreasing granularity in queries is desirable.
Unlock Deck
Unlock for access to all 108 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 108 flashcards in this deck.