S+ Objective 4.4 Quiz

Beschreibung

Implement the appropriate controls to ensure data security
Tyler Hampton
Quiz von Tyler Hampton, aktualisiert more than 1 year ago
Tyler Hampton
Erstellt von Tyler Hampton vor mehr als 6 Jahre
6
0

Zusammenfassung der Ressource

Frage 1

Frage
A user recently worked with classified data on an unclassified system. You need to sanitize all the reclaimed space on this system's hard drives while keeping the system operational. Which of the following methods will BEST meet this goal?
Antworten
  • Use a cluster tip wiping tool
  • Use a file shredding tool
  • Degauss the disk
  • Physically destroy the disk

Frage 2

Frage
Which of the following is the MOST likely negative result if administrators do not implement access controls correctly on an encrypted USB hard drive?
Antworten
  • Data can be corrupted
  • Security controls can be bypassed
  • Drives can be geo-tagged
  • Data is not encrypted

Frage 3

Frage
Your organization hosts a web site with a back-end database. The database stores customer data, including credit card numbers. Which of the following is the BEST way to protect the credit card data?
Antworten
  • Full database encryption
  • Whole disk encryption
  • Database column encryption
  • File-level encryption

Frage 4

Frage
Bart copied an encrypted file from his desktop computer to his USB drive and discovered that the copied file isn't encrypted. He asks you what he can do to ensure files he's encrypted remain encrypted when he copies them to a USB drive. What would you recommend as the BEST solution to this problem?
Antworten
  • Use file-level encryption
  • Convert the USB to FAT32
  • Use whole disk encryption on the desktop computer
  • Use whole disk encryption on the USB drive

Frage 5

Frage
You are comparing different encryption methods. Which method includes a storage root key?
Antworten
  • HSM
  • NTFS
  • VSAN
  • TPM

Frage 6

Frage
Your organization issues users a variety of different mobile devices. However, management wants to reduce potential data losses if the devices are lost or stolen. Which of the following is the BEST technical control to achieve this goal?
Antworten
  • Cable locks
  • Risk assessment
  • Disk encryption
  • Hardening the system

Frage 7

Frage
Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
Antworten
  • TPM
  • HSM
  • VM escape
  • DLP

Frage 8

Frage
Network administrators in your organization need to administer firewalls, security appliances, and other network devices. These devices are protected with strong passwords, and the passwords are stored in a file listing these passwords. Which of the following is the BEST choice to protect this password list?
Antworten
  • File encryption
  • Database field encryption
  • Full database encryption
  • Whole disk encryption
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

S+ Objective 4.2 Quiz
Tyler Hampton
Security+ High Availability Percentages
Lyndsay Badding
Security+ Cryptography
Lyndsay Badding
S+ Objective 2.1 Risk Calculation Flashcards
Tyler Hampton
S+ Objective 5.1 Authentication Services Flashcards
Tyler Hampton
S+ Obj 3.2 Cyber Attacks Flashcards
Tyler Hampton
S+ Objective 5.1 Authentication Services Visualization
Tyler Hampton
S+ Objective 1.1 Network Technologies Flashcards
Tyler Hampton
S+ Objective 1.1 Network Devices Flashcards
Tyler Hampton
S+ Objective 1.2 Network Administration Principles Flashcards
Tyler Hampton
S+ Obj 3.4 Wireless Attacks
Tyler Hampton