Midterm Exam Questions With Answers
2025/2026 Update| Graded A+
Which of the following threats occurs due to the loss of relevant encryption keys?
A Insider
B Service traffic hijacking
C Data loss
D Data breach - correct answers C
How many phases are there in the data lifecycle?
A7
B4
C5
D 6 - correct answers D
To which of the following phases of the data lifecycle is the process function
mapped?
A Archive
1|Page
Page 1
,B Create
C Destroy
D Store - correct answers B
Which of the following methods is used for implementing volume storage
encryption in an IaaS environment?
A Application-level encryption
B Proxy-based encryption
C File-level encryption
D Transparent encryption - correct answers B
Which technology allows a user to operate encrypted data without the need of
decrypting it?
A Data Anonymization
B Bit Splitting
C Secret Sharing Made Short
3|Page
Page 2
,D Homomorphic Encryption - correct answers D
What responsibility does a customer hold in the SaaS cloud service?
A Determining data for processing
B Determining instruments of processing
C Controlling functions of tools
D Controlling operations of management - correct answers A
Which data protection technique involves twisting the information in such a way
that it remains unintelligible, even if the source code is obtained?
A Tokenization
B Obfuscation
C Anonymization
D Encryption - correct answers B
5|Page
Page 3
, In which phase of the data lifecycle the data leaves active use phase and enters into
long-term storage?
A Share
B Archive
C Destroy
D Store - correct answers B
Where should the DLP (Data Leakage Prevention) engine be installed in a DIU
(Data in use) topology of data lifecycle?
A On the file server
B On the gateway
C On a user's workstation and endpoint devices
D On the application server - correct answers C
In which of the following encryption techniques does the encryption engine run on
a secure machine that handles all the cryptographic actions?
7|Page
Page 4