Data Classification and Types

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What step in the incident response process is the administrator following when they image the operating system to a known-good version?

  • Recovery (correct)
  • Containment
  • Detection
  • Lessons learned

What security practice is being followed when a company places a SCADA system on a segmented network with limited access?

  • Hardening
  • Load balancing
  • Data retention
  • Least privilege (correct)

What type of attack is being described in the security log that shows multiple failed password attempts from the same IP address?

  • Brute force (correct)
  • Spraying
  • DDoS
  • Downgrade

What process is being described when a user's laptop is moved to a private VLAN and updates are automatically installed?

<p>Configuration enforcement (B)</p> Signup and view all the answers

What is the primary goal of data loss prevention (DLP) systems?

<p>Preventing data loss (D)</p> Signup and view all the answers

What is the purpose of DNS filtering in an organization?

<p>Content filtering (A)</p> Signup and view all the answers

What type of data is typically not shared with other organizations or businesses?

<p>Trade secrets (A)</p> Signup and view all the answers

Which of the following is a requirement for the security team to implement according to the insurance company's policy?

<p>Access records from all devices must be saved and archived (C)</p> Signup and view all the answers

What is the primary goal of implementing time-of-day restrictions on the authentication server?

<p>To limit access to data during non-working hours (A)</p> Signup and view all the answers

Which of the following is a recommended implementation to meet the insurance company's policy requirement for data access?

<p>Restrict login access by IP address and GPS location (A)</p> Signup and view all the answers

What is the primary benefit of consolidating all logs on a SIEM?

<p>To create a centralized location for log analysis (D)</p> Signup and view all the answers

Which of the following is NOT a requirement for the security team to implement according to the insurance company's policy?

<p>Require government-issued identification during the onboarding process (C)</p> Signup and view all the answers

What type of alert would a system administrator receive when access rights are changed on a database containing private customer information?

<p>Change management notification (B)</p> Signup and view all the answers

What is the primary concern of a security administrator regarding external storage drives?

<p>Data exfiltration (A)</p> Signup and view all the answers

What would be the BEST way to prevent data exfiltration using external storage drives?

<p>Create an operating system security policy to block the use of removable media (D)</p> Signup and view all the answers

What type of data would a company's quarterly government reports be classified as?

<p>Regulated data (D)</p> Signup and view all the answers

What would be the purpose of an insurance company's set of policies to handle data breaches?

<p>Incident response (B)</p> Signup and view all the answers

What is the main goal of implementing access control measures on a database containing private customer information?

<p>To protect against unauthorized access (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Data Classification Quiz
9 questions
Data Classification and Security Policies
20 questions
Data Ownership and Classification Quiz
27 questions
Use Quizgecko on...
Browser
Browser