Domain 2 Asset Security

Domain 2 Asset Security

University

100 Qs

quiz-placeholder

Similar activities

ICT Fundamentals Quiz

ICT Fundamentals Quiz

University

102 Qs

BIS POP QUIZ 2

BIS POP QUIZ 2

University

102 Qs

Mid-term cybersecurity

Mid-term cybersecurity

University

100 Qs

DM Unit 2 Mod 2 SO 1 - 3 Test

DM Unit 2 Mod 2 SO 1 - 3 Test

University

100 Qs

IAS MIDTERM 1-6

IAS MIDTERM 1-6

University

101 Qs

CCNA 1 Chapters 1-3

CCNA 1 Chapters 1-3

University

95 Qs

ICT - session

ICT - session

University

104 Qs

CS Elective (DTP)

CS Elective (DTP)

University

100 Qs

Domain 2 Asset Security

Domain 2 Asset Security

Assessment

Quiz

Computers

University

Medium

Created by

IIMXX IIMXX

Used 1+ times

FREE Resource

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of these should NOT be part of a data retention policy?

Which backup system we use for backing our data up.

How long do we keep the data?

Where do we keep the backup data?

Which data do we keep?

Answer explanation

A backup policy would address which systems and media we would use, the retention policy would only deal with what, how long, where and similar topics.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

We have many different types of memory. Which type is volatile?

Flash memory.

DRAM

PROM

EEPROM

Answer explanation

RAM (Random Access memory) is volatile memory. It loses the memory content after a power loss or within a few minutes. ROM (Read Only memory) is nonvolatile it retains memory after power loss.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

We keep our backup data for as long as the information is usable or if we are required to by law, standards, or regulations. What is this an example of?

Proper data encryption.

Proper data handling.

Proper data retention.

Proper data storage.

Answer explanation

Data Retention: Data should not be kept beyond the period of usefulness or beyond the legal requirements (whichever is greater).

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

In designing our data retention policy, which of these should NOT be a consideration?

Which data do we keep?

How long do we keep the data?

Where do we keep the backup data?

How to safely destroy the data after the retention has expired?

Answer explanation

A data destruction policy would address how we deal with data no longer needed, the retention policy would only deal with what, how long, where and similar topics.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When a system has been certified, what does that mean?

The data owner has accepted the certification and the residual risk, which is required before the system is put into production.

The data steward has accepted the certification and the residual risk, which is required before the system is put into production.

It has met the data stewards' security requirements.

It has met the data owners' security requirements.

Answer explanation

Certification is when a system has been certified to meet the security requirements of the data owner. Certification considers the system, the security measures taken to protect the system, and the residual risk represented by the system.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Senior leadership has approved the use of flash drives. Which type of memory do they use?

EEPROM

PROM

SDRAM.

DRAM.

Answer explanation

Flash memory: Small portable drives (USB sticks are an example); they are a type of EEPROM.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of these is NOT an acceptable form of dealing with remanence?

Degaussing

Disk shredding.

Overwriting.

Formatting.

Answer explanation

Formatting puts a new file structure over the old one, the data is still recoverable in most cases.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?