
Domain 2 Asset Security

Quiz
•
Computers
•
University
•
Medium
IIMXX IIMXX
Used 1+ times
FREE Resource
100 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of these should NOT be part of a data retention policy?
Which backup system we use for backing our data up.
How long do we keep the data?
Where do we keep the backup data?
Which data do we keep?
Answer explanation
A backup policy would address which systems and media we would use, the retention policy would only deal with what, how long, where and similar topics.
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
We have many different types of memory. Which type is volatile?
Flash memory.
DRAM
PROM
EEPROM
Answer explanation
RAM (Random Access memory) is volatile memory. It loses the memory content after a power loss or within a few minutes. ROM (Read Only memory) is nonvolatile it retains memory after power loss.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
We keep our backup data for as long as the information is usable or if we are required to by law, standards, or regulations. What is this an example of?
Proper data encryption.
Proper data handling.
Proper data retention.
Proper data storage.
Answer explanation
Data Retention: Data should not be kept beyond the period of usefulness or beyond the legal requirements (whichever is greater).
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
In designing our data retention policy, which of these should NOT be a consideration?
Which data do we keep?
How long do we keep the data?
Where do we keep the backup data?
How to safely destroy the data after the retention has expired?
Answer explanation
A data destruction policy would address how we deal with data no longer needed, the retention policy would only deal with what, how long, where and similar topics.
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
When a system has been certified, what does that mean?
The data owner has accepted the certification and the residual risk, which is required before the system is put into production.
The data steward has accepted the certification and the residual risk, which is required before the system is put into production.
It has met the data stewards' security requirements.
It has met the data owners' security requirements.
Answer explanation
Certification is when a system has been certified to meet the security requirements of the data owner. Certification considers the system, the security measures taken to protect the system, and the residual risk represented by the system.
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Senior leadership has approved the use of flash drives. Which type of memory do they use?
EEPROM
PROM
SDRAM.
DRAM.
Answer explanation
Flash memory: Small portable drives (USB sticks are an example); they are a type of EEPROM.
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of these is NOT an acceptable form of dealing with remanence?
Degaussing
Disk shredding.
Overwriting.
Formatting.
Answer explanation
Formatting puts a new file structure over the old one, the data is still recoverable in most cases.
Create a free account and access millions of resources
Similar Resources on Wayground
100 questions
икт 1

Quiz
•
University
100 questions
5 Икт

Quiz
•
University
102 questions
C# NAHU!!!

Quiz
•
University
104 questions
ICT - session

Quiz
•
University
100 questions
CS Elective (DTP)

Quiz
•
University
102 questions
BIS POP QUIZ 2

Quiz
•
University
100 questions
ICT 1-100

Quiz
•
University
100 questions
NWC204 module 1-2-3

Quiz
•
University
Popular Resources on Wayground
15 questions
Hersheys' Travels Quiz (AM)

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
30 questions
Lufkin Road Middle School Student Handbook & Policies Assessment

Quiz
•
7th Grade
20 questions
Multiplication Facts

Quiz
•
3rd Grade
17 questions
MIXED Factoring Review

Quiz
•
KG - University
10 questions
Laws of Exponents

Quiz
•
9th Grade
10 questions
Characterization

Quiz
•
3rd - 7th Grade
10 questions
Multiply Fractions

Quiz
•
6th Grade