What is a common challenge that Data Security Posture Management (DSPM) tools aim to solve?
.
Apakah cabaran lazim yang cuba diselesaikan oleh alat Data Security Posture Management (DSPM)?
From Integrity to Exposure: A Modern cyber security approach
Quiz
•
Specialty
•
Professional Development
•
Medium
Chrisvito Arden
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is a common challenge that Data Security Posture Management (DSPM) tools aim to solve?
.
Apakah cabaran lazim yang cuba diselesaikan oleh alat Data Security Posture Management (DSPM)?
Malware protection
.
Perlindungan daripada perisian hasad
Tracking firewall performance
.
Menjejaki prestasi firewall
Identifying and protecting sensitive data in shared environments
.
Mengenal pasti dan melindungi data sensitif dalam persekitaran kongsi
Monitoring DNS traffic
.
Memantau trafik DNS
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
How can a school find out if internal sensitive student data is accessible from outside when it is not supposed to be?
.
Bagaimanakah sesebuah sekolah boleh mengetahui jika data pelajar dalaman yang sensitif boleh diakses dari luar walaupun ia tidak sepatutnya?
Continuously scan all storage and apps for exposed data
.
Imbas semua storan dan aplikasi secara berterusan untuk data yang terdedah
Block all USB devices on campus
.
Sekat semua peranti USB di kampus
Require students to use complex passwords
.
Wajibkan pelajar menggunakan kata laluan yang kompleks
Disable Wi-Fi after school hours
.
Lumpuhkan Wi-Fi selepas waktu sekolah
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
How long might it take to manually detect unauthorized system changes without proper FIM/SCM?
.
Tanpa alat FIM/SCM yang sesuai, berapa lama biasanya diambil untuk mengesan perubahan sistem tanpa kebenaran secara manual?
Minutes to hours with alerts
.
Beberapa minit hingga jam dengan sistem amaran
Days to weeks of manual log review
.
Beberapa hari hingga minggu melalui semakan log manual
Seconds with manual inspection
.
Beberapa saat dengan pemeriksaan manual
Never, since manual review is foolproof
.
Tak pernah, sebab semakan manual dianggap mencukupi
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
"Enforcing compliance with security policies and baselines."
Which solutions help the organization to perform this function?
.
"Menguatkuasakan pematuhan terhadap dasar dan garis panduan keselamatan.”
Penyelesaian manakah yang paling sesuai untuk fungsi ini?
Application Security Assessment
.
Penilaian Keselamatan Aplikasi
Continuous Threat Exposure Management (CTEM)
Security Configuration Management (SCM)
Data Security Posture Management (DSPM)
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
"After a new vulnerability is disclosed, it ranks vulnerabilities by exploitability and impact for prioritization."
Which solution performs this functionality?
.
"Selepas satu kelemahan keselamatan baru didedahkan, ia menyusun kelemahan berdasarkan keboleheksploitan dan impak untuk keutamaan."
Penyelesaian manakah yang menjalankan fungsi ini?
Security Configuration Management (SCM)
Continuous Threat Exposure Management (CTEM)
Data Security Posture Management (DSPM)
Application Security Assessment
.
Penilaian Keselamatan Aplikasi
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
"During a recent audit, your security team noticed unauthorized changes to the system."
Which tool would best help detect and alert on such changes in real time?
.
"Semasa audit baru-baru ini, pasukan keselamatan anda mengesan perubahan sistem tanpa kebenaran."
Alat manakah yang paling sesuai untuk mengesan dan memberi amaran tentang perubahan tersebut secara masa nyata?
Firewall
Continuous Threat Exposure Management (CTEM)
Data Security Posture Management (DSPM)
File Integrity Monitoring (FIM)
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
"The teachers of a school stores sensitive student data across multiple cloud platforms."
How can DSPM help?
.
"Guru-guru di sebuah sekolah menyimpan data pelajar sensitif merentasi pelbagai platform awan."
Bagaimanakah DSPM boleh membantu?
By tracking where sensitive data is stored and who has access using AI
.
Dengan menjejak lokasi simpanan data sensitif dan siapa yang mempunyai akses menggunakan AI
By blocking all external cloud connections
.
Dengan menyekat semua sambungan awan luar
By encrypting all files manually
.
Dengan menyulitkan semua fail secara manual
By limiting internet speeds for cloud users
.
Dengan mengehadkan kelajuan internet untuk pengguna awan
9 questions
Almacenes Sesión 4
Quiz
•
Professional Development
10 questions
UF302 Cap 2
Quiz
•
Professional Development
10 questions
Pre Test Supply Chain Concept - JLDP 4.2
Quiz
•
Professional Development
10 questions
4 UNIT : Introduction to Safety Management System (SMS)
Quiz
•
Professional Development
15 questions
[FAST TRACK] Android quiz 08 (03.06)
Quiz
•
Professional Development
9 questions
5 UNIT : Implementing the SMS-Key Roles and Accountabilities
Quiz
•
Professional Development
10 questions
Anime Quiz 2 (Special Takagi-San)
Quiz
•
Professional Development
10 questions
P231 Sustainable Site Planning Process
Quiz
•
University - Professi...
15 questions
Character Analysis
Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
10 questions
American Flag
Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25
Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers
Quiz
•
6th - 8th Grade