DLP solutions can aid in deterring loss due to which of the following? A. Power failure B. Performance C. Bad policy D. Malicious disclosure
Correct Answer: D
Explanation:
Explanation: DLP tools can identify outbound traffic that violates the organization’s policies. DLP will not protect against losses due to performance issues or power failures. The DLP solution must be configured according to the organization’s policies, so bad policies will attenuate the effectiveness of DLP tools, not the other way around.
All of the following are terms used to described the practice of obscuring original raw data so that only a portion is displayed for operational purposes, except: A. Tokenization B. Masking C. Data discovery D. Obfuscation
Correct Answer: C
Explanation:
Explanation: Data discovery is a term used to describe the process of identifying information according to specific traits or categories. The rest are all methods for obscuring data.
Data masking can be used to provide all of the following functionality, except: A. Secure remote access B. test data in sandboxed environments C. Authentication of privileged users D. Enforcing least privilege
Correct Answer: C
Explanation:
Explanation: Data masking does not support authentication in any way. All the others are excellent use cases for data masking.
The goals of SIEM solution implementation include all of the following, except: A. Dashboarding B. Performance enhancement C. Trend analysis D. Centralization of log streams
Correct Answer: B
Explanation:
Explanation: SIEM does not intend to provide any enhancement of performance; in fact, a SIEM solution may decrease performance because of additional overhead. All the rest are goals of SIEM implementations.
In the cloud motif, the data processor is usually: A. The cloud customer B. The cloud provider C. The cloud access security broker D. The party that assigns access rights
Correct Answer: B
Explanation:
Explanation: In legal terms, when “data processor” is defined, it refers to anyone who stores, handles, moves, or manipulates data on behalf of the data owner or controller. In the cloud computing realm, this is the cloud provider.
The most pragmatic option for data disposal in the cloud is which of the following? A. Cryptoshredding B. Overwriting C. Cold fusion D. Melting
Correct Answer: A
Explanation:
Explanation: We don’t have physical ownership, control, or even access to the devices holding the data, so physical destruction, including melting, is not an option. Overwriting is a possibility, but it is complicated by the difficulty of locating all the sectors and storage areas that might have contained our data, and by the likelihood that constant backups in the cloud increase the chance we’ll miss something as it’s being overwritten. Cryptoshredding is the only reasonable alternative. Cold fusion is a red herring.
What is the intellectual property protection for a useful manufacturing innovation? A. Trademark B. Copyright C. patent D. Trade secret
Correct Answer: C
Explanation:
Explanation: Patents protect processes (as well as inventions, new plantlife, and decorative patterns). The other answers listed are answers to other questions.
The goals of DLP solution implementation include all of the following, except: A. Elasticity B. Policy enforcement C. Data discovery D. Loss of mitigation
Correct Answer: A
Explanation:
Explanation: DLP does not have anything to do with elasticity, which is the capability of the environment to scale up or down according to demand. All the rest are goals of DLP implementations.
Please disable your adblocker or whitelist this site!