Search Header Logo

Domain 2 Asset Security

Authored by IIMXX IIMXX

Computers

University

Used 1+ times

Domain 2 Asset Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of these should NOT be part of a data retention policy?

Which backup system we use for backing our data up.

How long do we keep the data?

Where do we keep the backup data?

Which data do we keep?

Answer explanation

A backup policy would address which systems and media we would use, the retention policy would only deal with what, how long, where and similar topics.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

We have many different types of memory. Which type is volatile?

Flash memory.

DRAM

PROM

EEPROM

Answer explanation

RAM (Random Access memory) is volatile memory. It loses the memory content after a power loss or within a few minutes. ROM (Read Only memory) is nonvolatile it retains memory after power loss.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

We keep our backup data for as long as the information is usable or if we are required to by law, standards, or regulations. What is this an example of?

Proper data encryption.

Proper data handling.

Proper data retention.

Proper data storage.

Answer explanation

Data Retention: Data should not be kept beyond the period of usefulness or beyond the legal requirements (whichever is greater).

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

In designing our data retention policy, which of these should NOT be a consideration?

Which data do we keep?

How long do we keep the data?

Where do we keep the backup data?

How to safely destroy the data after the retention has expired?

Answer explanation

A data destruction policy would address how we deal with data no longer needed, the retention policy would only deal with what, how long, where and similar topics.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

When a system has been certified, what does that mean?

The data owner has accepted the certification and the residual risk, which is required before the system is put into production.

The data steward has accepted the certification and the residual risk, which is required before the system is put into production.

It has met the data stewards' security requirements.

It has met the data owners' security requirements.

Answer explanation

Certification is when a system has been certified to meet the security requirements of the data owner. Certification considers the system, the security measures taken to protect the system, and the residual risk represented by the system.

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Senior leadership has approved the use of flash drives. Which type of memory do they use?

EEPROM

PROM

SDRAM.

DRAM.

Answer explanation

Flash memory: Small portable drives (USB sticks are an example); they are a type of EEPROM.

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of these is NOT an acceptable form of dealing with remanence?

Degaussing

Disk shredding.

Overwriting.

Formatting.

Answer explanation

Formatting puts a new file structure over the old one, the data is still recoverable in most cases.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?