- Data Loss Prevention
- Data Loss Detection
- Data Classification, Labeling, and Tagging
- Obfuscation
- Anonymization
- Encrypted vs. Unencrypted
- Data Life Cycle
- Data Inventory and Mapping
- Data Integrity Management
- Data Storage, Backup, and Recovery
- Exam Preparation Tasks
- Review All Key Topics
- Define Key Terms
- Review Questions
Review Questions
1. Which of the following forms of RAID places the parity information on a single drive?
RAID 0
RAID 1
RAID 3
RAID 5
2. Which of the following techniques or tools is used to deploy print blocking?
DLP
RAID
RDP
VDI
3. Which of the following is not a characteristic of RDP?
Server downtime can cause issues for many users.
Data is not kept in the data center, so disaster recovery is easier.
Network issues can cause problems for many users.
Insufficient processing power in the host system can cause bottlenecks.
4. In which of the following rotation schemes are three sets of backups defined?
FIFO
RAID
GFS
STP
5. In which VDI model are desktops maintained by a service provider?
Centralized model
Hosted model
Remote virtual desktops model
Streaming model
6. Which backup model is the fastest to back up but the slowest to restore?
Full
Copy
Differential
Incremental
7. Which backup type is used to capture all transactions that have occurred since the last backup?
Transaction log backup
Incremental backup
Full backup
Copy backup
8. Which backup method involves copying files as modifications occur in real time?
Electronic vaulting
Optical jukebox
Remote journaling
Tape vaulting
9. Which of the following enumerates requirements that payment card industry players should meet to secure and monitor their networks, protect cardholder data, manage vulnerabilities, implement strong access controls, and maintain security policies?
GLBA
PCI DSS
COPPA
SOX
10. Which RAID method can potentially survive two drive failures?
RAID 1
RAID 3
RAID 5
RAID 10