Data Loss Prevention and Mobile Endpoint Protection Graded Assessment
1.
Which mobile operating system was originally based on the Linux kernel?
Correct!
2.
Which two (2) mobile operating combined dominate the vast majority of the smartphone market? (Select 2)
Partially correct!
Partially correct!
3.
True or False. Security is enhanced on Android mobile devices because users interact directly with the operating system.
Correct!
4.
What is one limitation to the operation of anti-virus software running on mobile devices?
Correct!
5.
On a mobile device, which type of threat is a phishing scam?
Correct!
6.
A university uses clustered servers to make sure students will always be able to submit their assignments even if one server is down for maintenance. Server clustering enables which aspect of the CIA Triad?
Correct!
7.
A university has enabled WPA2 encryption on its WiFi systems throughout the campus. Which aspect of the CIA Triad is directly supported by this action?
Correct!
8.
A student can see her grades via her school's Student Portal but is unable to change them. This restriction is in support of which aspect of the CIA Triad?
Correct!
9.
True or False. An operator who corrupts data by mistake is considered an "inadvertent attack" that should be considered when developing data protection plans.
Correct!
10.
C-level executives face 4 challenges when assuring their organizations maintain a comprehensive and workable data security solution. GDPR, CCPA, and PCC-DSS are concerned with which one of these challenges?
Correct!
11.
True of False. A biotech research company with a very profitable product line has grown so rapidly it has acquired a marketing company, a small IT services company and a company that specializes in pharmaceutical manufacturing and distribution. The CEO of the parent company made a good decision when he decided not to consolidate all data security under a single CISO, believing that each of the new divisions understands its own data security needs better than the parent company possibly could.
Correct!
12.
Which three (3) of these are among the 5 common pitfalls of data security? (Select 3)
Partially correct!
Partially correct!
Partially correct!
13.
All industries have their own unique data security challenges. Which of these industries has a particular concern with a widely distributed IT infrastructure that must provide services across a multiple government jurisdictions while not violating the privacy concerns of its users?
Correct!
14.
Which three (3) of these are among the top 12 capabilities that a good data security and protection solution should provide? (Select 3)
Partially correct!
Partially correct!
Partially correct!
15.
Which is the data protection process that addresses inappropriate privileges, insecure authentication methods, account sharing, configuration files and missing security patches?
Correct!
16.
Which data protection process substitutes key data with a token that is issued by a trusted third-party where the token can be accessed but not redeemed by an untrusted party?
Correct!
17.
IBM Guardium provides heterogeneous data source support. This support results in which capability?
Correct!
Comments