QUESTIONS WITH
CORRECT ANSWERS
Who should be involved in the creation of retention policies? - Answer- both business
units and the legal department
When performing trend analysis, increasing granularity in queries is desirable. - Answer-
false
With local backup processes, policies are easily enforced. - Answer- false
Backup media should be encrypted. - Answer- true
________ is an example of PII. - Answer- social security number
One of the most often overlooked mechanisms used to reduce data loss is employee
training. - Answer- true
Using the delete key prevents data from being easily recovered. - Answer- false
Changing the default listening port is an effective way of discouraging attackers from
accessing the database. - Answer- true
Typically, having enough shadow backup space for a few days is sufficient. - Answer-
true
In the long term, backup media should be stored at a different site. - Answer- true
Backup policies should be audited regularly and include tracing what happens in
samples of data. - Answer- false
Encryption is usually fully transparent to the PC user. - Answer- true
Incremental and full backups may be restored out of order in which they were created. -
Answer- false
Wiping/clearing is the best approach to destroying media. - Answer- false
, Adding invisible information to a file that can be used to identify its source is called
________. - Answer- watermarking
With RAID 1, the following is achieved ________. - Answer- redundancy
Properly hardened hosts and securely coded applications can help protect data while it
is transmitted. - Answer- false
Profiling uses ________ to find patterns in a dataset which uniquely identify an
individual. - Answer- all of these
Companies usually conduct full backups on a ________ basis. - Answer- weekly
________ is the process of obscuring data such that it cannot identify a specific person,
but remains practically useful. - Answer- data masking
Incremental backups are usually discarded after the next full backup. - Answer- true
DRM restricts what people can do with sensitive material. - Answer- true
DLL triggers are used to ________. - Answer- neither maliciously attack databases nor
produce automatic responses if the data of the database has been altered
________ backups only back up data that has changed since the most recent full
backup. - Answer- incremental
Another name for RAID 0 is ________. - Answer- striping
If a PC user has full-disk encryption, a weak password is not as great a danger as it
would be if the disk were not encrypted. - Answer- false
Companies address the risk of losing a security key by using ________. - Answer- key
escrow
In a relational database, examples of entities include ________. - Answer- NOT all of
these
NOT things
NOT events
DRM usually is difficult to enforce. - Answer- true
Retaining data can be ________. - Answer- both expensive and susceptible to
discovery of damaging information
Shredding is the best approach to destroying media. - Answer- true