
2.1 Architecture and Design - Enterprise Environment
Authored by Prem Jadhwani
Computers
Professional Development
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Scenario: Sarah, an employee at a financial institution, frequently handles sensitive customer information, including financial records and personal data. One day, she inadvertently attaches a file containing confidential client details to an email intended for a colleague, but mistakenly sends it to an external email address. In this situation, what solution could the financial institution use to ensure this doesn't happen again?
Digital Ledger Protocol (DLP)
Dynamic Link Libraries (DLL)
Data Loss Prevention (DLP)
Data Ledger Prevention (DLP)
Answer explanation
Data Loss Prevention is a strategy or set of tools and processes designed to prevent unauthorized access, sharing, or leakage of sensitive and confidential information. (2.1)
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
IP Cyber handles a vast amount of customer data, including personally identifiable information (PII). To conduct software testing, developers require a realistic dataset that mirrors the production environment. However, they need to ensure that actual customer information remains confidential and protected. What solution can be implemented to provide realistic test datasets for software development while safeguarding sensitive customer information?
Data Encryption
Data Clustering
Data Archiving
Data Masking
Answer explanation
Data Masking transforms sensitive information for testing while maintaining structure. It allows realistic datasets without exposing actual customer data.
Data Encryption: Encrypts but doesn't transform data, maintaining sensitivity.
Data Archiving: Focuses on storage, not suitable for creating realistic test datasets.
Data clustering: A technique used for grouping similar data points based on certain criteria. (2.1)
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
IP Cyber stores customer financial records in a centralized database. To ensure the security of this information during transmission over the network, the company decides to implement a protective measure that will safeguard these records during their transmission. Which of the solutions will provide the best protection?
Data Obfuscation
Data Compression
Data Encryption
Data Masking
Answer explanation
Data encryption is designed to secure information during transmission, converting it into a coded format that can only be deciphered by authorized parties.
Data Obfuscation: Obfuscation involves making data unclear, but it may not provide the robust protection needed during transmission.
Data Compression: Compression reduces file size but doesn't focus on securing data during transmission.
Data Masking: Masking is more relevant for creating non-production datasets than securing data during transmission. (2.1)
Data encryption is designed to secure information during transmission, converting it into a coded format that can only be deciphered by authorized parties.
Data Obfuscation: Obfuscation involves making data unclear, but it may not provide the robust protection needed during transmission.
Data Compression: Compression reduces file size but doesn't focus on securing data during transmission.
Data Masking: Masking is more relevant for creating non-production datasets than securing data during transmission. (2.1)
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
IP Cyber regularly archives historical customer data on a server that is not actively accessed, processed or transmitted. This data will sit in a static state, residing on the storage media for a long period of time. What is this known as?
Data Masking
Data Encryption
Data at Rest
Data in Transit
Answer explanation
Data at rest refers to information that is stored or archived on a storage device and is not actively being used, processed, or transmitted. This data is in a static state, residing on physical or digital storage media such as hard drives, solid-state drives, databases, tapes, or any other form of persistent storage. (2.1)
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A banking company processes a large volume of credit card transactions daily. To enhance the security of customer payment information stored in their database, they seek a solution that replaces sensitive card numbers with randomly generated tokens while maintaining referential integrity for transaction purposes. As a security solutions provide for IP Cyber, what do you recommend they use?
Data Obfuscation
Data Masking
Data Encryption
Data Tokenization
Answer explanation
Data Tokenization involves replacing sensitive data with unique tokens, maintaining referential integrity for transactional purposes. It ensures that the original data is not exposed, providing a secure way to handle sensitive information like credit card numbers.
Data Masking: Masks data for non-production purposes but may not be suitable for maintaining referential integrity in transactional systems.
Data Encryption: Secures data through coded formats but does not typically maintain referential integrity for transactional processes.
Data Obfuscation: Involves making data unclear but may not provide the structured replacement needed for transactional integrity.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
After a system update, you notice performance issues and unexpected behavior in your server. You decide to restore the system to its original state to troubleshoot the issue. What term best describes bringing the system back to its initial, securely configured state?
System Virtualization
System Snapshot
System Redundancy
System Baseline Configuration
Answer explanation
Baseline configuration refers to the standard, securely configured state of a system. Restoring the system to its baseline helps troubleshoot issues and ensures a known, secure starting point.
System Snapshot: A snapshot captures the current state but doesn't necessarily represent the securely configured baseline.
System Redundancy: Redundancy is about having backup components, not restoring to a specific configuration state.
System Virtualization: Virtualization involves creating virtual instances but doesn't inherently mean restoring to a securely configured baseline.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
John, a network administrator, encounters connectivity issues in a company's network. To diagnose and resolve the problems, he needs to understand and document the structure and layout of the network communication protocols. What term best describes the structured plan or framework outlining the rules and conventions for internet communication?
Network Routing Table
Network Firewall Configuration
Internet Protocol Addressing
Internet Protocol Schema
Answer explanation
Internet Protocol Schema refers to the organized plan or framework specifying the rules and conventions for communication over the internet. It encompasses the protocols governing data transmission.
Network Routing Table: A routing table is a dynamic document showing the path data takes through a network, but it doesn't capture the overall schema of internet communication.
Internet Protocol Addressing: Addressing focuses on the assignment of unique identifiers to devices but doesn't encompass the entire structured plan for internet communication.
Network Firewall Configuration: Firewall configuration involves setting rules for network security but doesn't represent the overall schema of internet communication protocols.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Kartkówka Kl.1 rejestr cmd zapora
Quiz
•
Professional Development
10 questions
ER Model
Quiz
•
Professional Development
10 questions
C Programming
Quiz
•
Professional Development
10 questions
Web Browsing
Quiz
•
10th Grade - Professi...
10 questions
SUBMARINE LIFE
Quiz
•
10th Grade - Professi...
10 questions
Introduction to Hyperconverged: HCI 101
Quiz
•
Professional Development
10 questions
PKS Quiz
Quiz
•
Professional Development
10 questions
Sosialisasi BRIONE Data
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development