CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Sensitive information and media secu

CISM Certification Domain 1: Information Security Governance Video Boot Camp 2019 - Sensitive information and media secu

Assessment

Interactive Video

Created by

Quizizz Content

Information Technology (IT), Architecture

University

Hard

The video tutorial covers data protection strategies, focusing on encryption for data at rest, in motion, and in use. It emphasizes the importance of secure storage, backup practices, and compliance with legal requirements. The tutorial also highlights the need for physical security measures and user awareness to prevent unauthorized access and data breaches.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary method recommended for protecting data at rest?

Installing firewalls

Using antivirus software

Regularly updating passwords

Implementing disk encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is end-to-end encryption important for data in motion?

It speeds up data transfer

It simplifies network configuration

It prevents unauthorized access during transfer

It reduces data size

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a clean desk policy?

A policy to ensure desks are always tidy

A policy to restrict desk usage to authorized personnel

A policy to manage printed sensitive data

A policy to limit desk space usage

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended practice to prevent shoulder surfing?

Using privacy screens on monitors

Installing security cameras

Using noise-cancelling headphones

Positioning desks against walls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why should backup tapes be stored in a geographically distant location?

To comply with international laws

To reduce storage costs

To protect against local disasters

To make data retrieval faster

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should organizations consider when deciding how long to retain data?

The type of data being stored

The cost of storage

The legal requirements and data usefulness

The availability of storage space

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential risk of not following data retention laws?

Increased data processing speed

Legal penalties and data breaches

Improved data accessibility

Enhanced data security