Quiz: Demystifying data encryption


Quiz: Demystifying data encryption

@26777 This tip is part of SearchSecurity.com's Data Protection Security School lesson, Data encryption demystified. Visit the lesson page for more learning resources.

1. Which of the following is a security advantage of database encryption?

  1. It enables organizations to meet compliance requirements.
  2. It makes it easy to protect the database from administrators.
  3. It provides protections against modification and deletion.
  4. It helps applications process data more quickly.

2. Which is not among the hidden security costs associated with software-based full-disk data encryption for workstations?

  1. Deployment costs
  2. Help desk costs
  3. Crashed hard drive data recovery costs
  4. Fines from privacy breaches due to a lost laptop

3. Fill in the blank: The five components of encryption key management are issuing, revising, revoking, _________ and recovery.

  1. reverifying
  2. backup
  3. remote logging
  4. reissuing

4. Fill in the blank: Data access, data retention, data security and data destruction are all components of ___________ .

  1. data encryption
  2. business processing
  3. data classification
  4. privacy breaches

5. Fill in the blank: The most important member of any data encryption security team should be the __________ .

  1. project manager
  2. information security staff
  3. IT help desk
  4. business unit(s) needing encryption

If you answered two or more questions incorrectly, revisit the materials from the lesson Data encryption demystified:

  • Tip: How to conduct a data classification assessment
  • Webcast: Data encryption demystified
  • Podcast: Fact or fiction: Pros and cons of database encryption

    If you answered four or more questions correctly, return to SearchSecurity.com's Data Protection Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

  • Email Alerts

    Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
    By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

    COMMENTS powered by Disqus  //  Commenting policy