Skip to main content

Data Loss Prevention and Mobile Endpoint Protection Graded Assessment

 Data Loss Prevention and Mobile Endpoint Protection Graded Assessment



Question 1

Which mobile operating system was originally based on the Linux kernel?

1 / 1 point
Correct

Correct!

Question 2

Which two (2) mobile operating combined dominate the vast majority of the smartphone market? (Select 2)

1 / 1 point
Correct

Partially correct!

Correct

Partially correct!

Question 3

True or False. Security is enhanced on Android mobile devices because users interact directly with the operating system.

1 / 1 point
Correct

Correct!

Question 4

What is one limitation to the operation of anti-virus software running on mobile devices?

1 / 1 point
Correct

Correct!

Question 5

On a mobile device, which type of threat is a phishing scam?

1 / 1 point
Correct

Correct!

Question 6

A university uses clustered servers to make sure students will always be able to submit their assignments even if one server is down for maintenance. Server clustering enables which aspect of the CIA Triad?

1 / 1 point
Correct

Correct!

Question 7

A university has enabled WPA2 encryption on its WiFi systems throughout the campus. Which aspect of the CIA Triad is directly supported by this action?

1 / 1 point
Correct

Correct!

Question 8

A student can see her grades via her school's Student Portal but is unable to change them. This restriction is in support of which aspect of the CIA Triad?

1 / 1 point
Correct

Correct!

Question 9

True or False. An operator who corrupts data by mistake is considered an "inadvertent attack" that should be considered when developing data protection plans.

1 / 1 point
Correct

Correct!

Question 10

C-level executives face 4 challenges when assuring their organizations maintain a comprehensive and workable data security solution. GDPR, CCPA, and PCC-DSS are concerned with which one of these challenges?

1 / 1 point
Correct

Correct!

Question 11

True of False. A biotech research company with a very profitable product line has grown so rapidly it has acquired a marketing company, a small IT services company and a company that specializes in pharmaceutical manufacturing and distribution. The CEO of the parent company made a good decision when he decided not to consolidate all data security under a single CISO, believing that each of the new divisions understands its own data security needs better than the parent company possibly could.

1 / 1 point
Correct

Correct!

Question 12

Which three (3) of these are among the 5 common pitfalls of data security? (Select 3)

1 / 1 point
Correct

Partially correct!

Correct

Partially correct!

Correct

Partially correct!

Question 13

All industries have their own unique data security challenges. Which of these industries has a particular concern with a widely distributed IT infrastructure that must provide services across a multiple government jurisdictions while not violating the privacy concerns of its users?

1 / 1 point
Correct

Correct!

Question 14

Which three (3) of these are among the top 12 capabilities that a good data security and protection solution should provide? (Select 3)

1 / 1 point
Correct

Partially correct!

Correct

Partially correct!

Correct

Partially correct!

Question 15

Which is the data protection process that addresses inappropriate privileges, insecure authentication methods, account sharing, configuration files and missing security patches?

1 / 1 point
Correct

Correct!

Question 16

Which data protection process substitutes key data with a token that is issued by a trusted third-party where the token can be accessed but not redeemed by an untrusted party?

1 / 1 point
Correct

Correct!

Question 17

IBM Guardium provides heterogeneous data source support. This support results in which capability?

1 / 1 point
Correct

Correct!

Comments

Popular posts from this blog

Weekly challenge 3 data analyst google professional certificate

1 . Question 1 The manage stage of the data life cycle is when a business decides what kind of data it needs, how the data will be handled, and who will be responsible for it. 1 / 1  point True False Correct During planning, a business decides what kind of data it needs, how it will be managed throughout its life cycle, who will be responsible for it, and the optimal outcomes. 2 . Question 2 A data analyst is working at a small tech startup. They’ve just completed an analysis project, which involved private company information about a new product launch. In order to keep the information safe, the analyst uses secure data-erasure software for the digital files and a shredder for the paper files. Which stage of the data life cycle does this describe? 1 / 1  point Archive Plan Manage Destroy Correct This describes the destroy phase, during which data analysts use secure data-erasure software and shred paper files to protect private information. 3 . Question 3 In the analyze phase of the d

Prepare Data for Exploration: Weekly challenge 4

Prepare Data for Exploration: Weekly challenge 4 1 . Question 1 A data analytics team labels its files to indicate their content, creation date, and version number. The team is using what data organization tool? 1 / 1  point File-naming verifications File-naming references File-naming conventions File-naming attributes Correct 2 . Question 2 Your boss assigns you a new multi-phase project and you create a naming convention for all of your files. With this project lasting years and incorporating multiple analysts it’s crucial that you create data explaining how your naming conventions are structured. What is this data called? 0 / 1  point Descriptive data Named convention Metadata Labeled data Incorrect Please review the video on naming conventions . 3 . Question 3 A grocery store is collecting inventory data from their produce section. What is an appropriate naming convention for this file? 0 / 1  point Todays_Produce Produce_Inventory_2022-09-15_V01 Todays Produce 2022-15-09 Inventory

Prepare Data for Exploration : weekly challenge 1

Prepare Data for Exploration : weekly challenge 1 #coursera #exploration #weekly #challenge 1 #cybersecurity #coursera #quiz #solution #network Are you prepared to increase your data exploration abilities? The goal of Coursera's Week 1 challenge, "Prepare Data for Exploration," is to provide you the skills and resources you need to turn unprocessed data into insightful information. With the knowledge you'll gain from this course, you can ensure that your data is organised, clean, and ready for analysis. Data preparation is one of the most important processes in any data analysis effort. Inaccurate results and flawed conclusions might emerge from poorly prepared data. You may prepare your data for exploration with Coursera's Weekly Challenge 1. You'll discover industry best practises and insider advice. #answers #questions #flashcard 1 . Question 1 What is the most likely reason that a data analyst would use historical data instead of gathering new data? 1 / 1