A user recently worked with classified data on an unclassified system. You need to sanitize all the reclaimed space on this system's hard drives while keeping the system operational. Which of the following methods will BEST meet this goal?
Responda
Use a cluster tip wiping tool
Use a file shredding tool
Degauss the disk
Physically destroy the disk
Questão 2
Questão
Which of the following is the MOST likely negative result if administrators do not implement access controls correctly on an encrypted USB hard drive?
Responda
Data can be corrupted
Security controls can be bypassed
Drives can be geo-tagged
Data is not encrypted
Questão 3
Questão
Your organization hosts a web site with a back-end database. The database stores customer data, including credit card numbers. Which of the following is the BEST way to protect the credit card data?
Responda
Full database encryption
Whole disk encryption
Database column encryption
File-level encryption
Questão 4
Questão
Bart copied an encrypted file from his desktop computer to his USB drive and discovered that the copied file isn't encrypted. He asks you what he can do to ensure files he's encrypted remain encrypted when he copies them to a USB drive. What would you recommend as the BEST solution to this problem?
Responda
Use file-level encryption
Convert the USB to FAT32
Use whole disk encryption on the desktop computer
Use whole disk encryption on the USB drive
Questão 5
Questão
You are comparing different encryption methods. Which method includes a storage root key?
Responda
HSM
NTFS
VSAN
TPM
Questão 6
Questão
Your organization issues users a variety of different mobile devices. However, management wants to reduce potential data losses if the devices are lost or stolen. Which of the following is the BEST technical control to achieve this goal?
Responda
Cable locks
Risk assessment
Disk encryption
Hardening the system
Questão 7
Questão
Your organization recently purchased several new laptop computers for employees. You're asked to encrypt the laptop's hard drives without purchasing any additional hardware. What would you use?
Responda
TPM
HSM
VM escape
DLP
Questão 8
Questão
Network administrators in your organization need to administer firewalls, security appliances, and other network devices. These devices are protected with strong passwords, and the passwords are stored in a file listing these passwords. Which of the following is the BEST choice to protect this password list?
Responda
File encryption
Database field encryption
Full database encryption
Whole disk encryption
Quer criar seus próprios Quizzesgratuitos com a GoConqr? Saiba mais.