Data Classification and Types

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What step in the incident response process is the administrator following when they image the operating system to a known-good version?

  • Recovery (correct)
  • Containment
  • Detection
  • Lessons learned

What security practice is being followed when a company places a SCADA system on a segmented network with limited access?

  • Hardening
  • Load balancing
  • Data retention
  • Least privilege (correct)

What type of attack is being described in the security log that shows multiple failed password attempts from the same IP address?

  • Brute force (correct)
  • Spraying
  • DDoS
  • Downgrade

What process is being described when a user's laptop is moved to a private VLAN and updates are automatically installed?

<p>Configuration enforcement (B)</p> Signup and view all the answers

What is the primary goal of data loss prevention (DLP) systems?

<p>Preventing data loss (D)</p> Signup and view all the answers

What is the purpose of DNS filtering in an organization?

<p>Content filtering (A)</p> Signup and view all the answers

What type of data is typically not shared with other organizations or businesses?

<p>Trade secrets (A)</p> Signup and view all the answers

Which of the following is a requirement for the security team to implement according to the insurance company's policy?

<p>Access records from all devices must be saved and archived (C)</p> Signup and view all the answers

What is the primary goal of implementing time-of-day restrictions on the authentication server?

<p>To limit access to data during non-working hours (A)</p> Signup and view all the answers

Which of the following is a recommended implementation to meet the insurance company's policy requirement for data access?

<p>Restrict login access by IP address and GPS location (A)</p> Signup and view all the answers

What is the primary benefit of consolidating all logs on a SIEM?

<p>To create a centralized location for log analysis (D)</p> Signup and view all the answers

Which of the following is NOT a requirement for the security team to implement according to the insurance company's policy?

<p>Require government-issued identification during the onboarding process (C)</p> Signup and view all the answers

What type of alert would a system administrator receive when access rights are changed on a database containing private customer information?

<p>Change management notification (B)</p> Signup and view all the answers

What is the primary concern of a security administrator regarding external storage drives?

<p>Data exfiltration (A)</p> Signup and view all the answers

What would be the BEST way to prevent data exfiltration using external storage drives?

<p>Create an operating system security policy to block the use of removable media (D)</p> Signup and view all the answers

What type of data would a company's quarterly government reports be classified as?

<p>Regulated data (D)</p> Signup and view all the answers

What would be the purpose of an insurance company's set of policies to handle data breaches?

<p>Incident response (B)</p> Signup and view all the answers

What is the main goal of implementing access control measures on a database containing private customer information?

<p>To protect against unauthorized access (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Data Classification Quiz
9 questions
Data Classification and Security Policies
20 questions
Data Ownership and Classification Quiz
27 questions
Use Quizgecko on...
Browser
Browser