FDE and Self-Encrypting Hard Drives Quiz

StunnedFauvism avatar
StunnedFauvism
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is the purpose of computer tracking software?

To find a PC after it is lost or stolen

What is a kill switch used for in the context of protecting hardware?

To destroy sensitive data on a stolen or lost PC

How can ruggedized PCs help in protecting hardware?

They are designed for more abuse than conventional hardware

What is the purpose of a surge suppressor in hardware protection?

<p>To protect hardware from damage due to electrical fluctuations</p> Signup and view all the answers

How does an uninterruptible power supply (UPS) help in hardware protection?

<p>It provides continuous power to a computer system after power outage</p> Signup and view all the answers

What are some other precautions mentioned for protecting hardware?

<p>Alarm software, tamper evident labels, etc.</p> Signup and view all the answers

What is a digital watermark?

<p>A subtle alteration to a digital item that can be retrieved to identify the owner of the item.</p> Signup and view all the answers

What technology is used in digital imaging hardware to identify U.S. currency?

<p>Special paper.</p> Signup and view all the answers

Name one method, other than digital watermarks, used to protect against digital counterfeiting.

<p>Holograms.</p> Signup and view all the answers

What type of data breaches have been a concern for businesses according to the text?

<p>Lost or stolen hardware, carelessness with documents containing sensitive data, database breaches.</p> Signup and view all the answers

What is a marketing database?

<p>A collection of data about people used for marketing purposes.</p> Signup and view all the answers

What is a common concern related to web activity and email privacy?

<p>Privacy challenges.</p> Signup and view all the answers

What is continuous data protection (CDP) and why is it important?

<p>Continuous data protection (CDP) enables data backups to be made on a continual basis, ensuring up-to-date backups are available in case of system failure or data loss.</p> Signup and view all the answers

How can businesses protect against hardware loss?

<p>Businesses can protect against hardware loss by using screen protectors, jewel cases, etc., and by implementing appropriate backup and disaster recovery plans.</p> Signup and view all the answers

What is digital counterfeiting and how is it done?

<p>Digital counterfeiting is the use of computers to make illegal copies of currency, checks, collectibles, and other items, often by scanning and printing or color-copying them.</p> Signup and view all the answers

What are some measures to protect against software piracy?

<p>Measures to protect against software piracy include educating businesses and consumers, strengthening antipiracy laws, using holograms, enforcing mandatory product registration/activation, and monitoring online auction sites.</p> Signup and view all the answers

How can individuals ensure data protection against system failure?

<p>Individuals can ensure data protection against system failure by using appropriate backup procedures, securing backup media, and considering online backup options.</p> Signup and view all the answers

Explain the concept of disaster-recovery plan in the context of businesses.

<p>A disaster-recovery plan spells out what an organization will do to prepare for and recover from a disruptive event, ensuring business continuity and resilience.</p> Signup and view all the answers

More Quizzes Like This

Mastering Data Recovery
3 questions
Cervical Disk Injuries Quiz
5 questions

Cervical Disk Injuries Quiz

CourteousResilience avatar
CourteousResilience
Full Disk Encryption and Data Protection
23 questions
Use Quizgecko on...
Browser
Browser