CYB 140 Wk 4 – Practice: Quiz

0 items
CYB 140 Wk 4 - Practice: Quiz
CYB 140 Wk 4 – Practice: Quiz
$5.00
  • Description

CYB 140 Wk 4 – Practice: Quiz

  1. Question 1

4/4

Identify the state of data when it is stored or processed by RAM, CPUs, or databases.

Hide answer choices

Data in Transit

Data at Rest

Data at fly

Data in Use

  1. Question 2

4/4

Which of the following technique ensures data security by obscuring specific areas of information?

Hide answer choices

Masking

Correct answer

Hashing

Encryption

Decryption

  1. Question 3

4/4

Which of the following protects information by obscuring specific areas of data with random characters or codes?

Hide answer choices

Data encryption

Data masking

Data retention

Data replication

  1. Question 4

4/4

Which of the following is an example of data in use?

Hide answer choices

An email being sent

Data stored in RAM

Customer bank balance stored in a database

Data stored in off-site cloud backup

  1. Question 5

4/4

Which of the following is a set of software products and processes that do not allow users to send confidential corporate data outside their organization?

Hide answer choices

SAM

IDM

DLP

EFS

  1. Question 6

4/4

Which of the following S/MIME encryption levels is represented by the gray color in Gmail?

Hide answer choices

Email message is encrypted with S/MIME encryption

No Encryption

Email message is encrypted with TLS encryption

Email message is encrypted with PGP encryption

  1. Question 7

4/4

Which of the following is an in-built Windows feature that provides filesystem-level encryption in all versions of Windows starting from Windows 2000, except the Home Edition of Windows?

Hide answer choices

Disk Utility

FileVault

EFS

BitLocker

  1. Question 8

4/4

Which of the following process replaces vulnerable or sensitive data with fictitious functional data that seems real, allowing the fictitious data to be used safely in operations where the original data are not required?

Hide answer choices

Data replication

Data retention

Data masking

Data encryption

  1. Question 9

4/4

Which of the following types of backup methods takes backup when the system is not working or is not accessible by users?

Hide answer choices

Online Backup

Incremental Backup

Hot Backup

 

Cold Backup

  1. Question 10

4/4

Choose a backup type from the following that will help the users have the fastest backup while using the least amount of storage space?

Hide answer choices

Full backup

 

Incremental backup

Differential Backup

Hot Backup