News

Quiz: Enterprise strategies for protecting data at rest

@26777 This tip is part of SearchSecurity.com's Data Protection Security School lesson, Enterprise strategies for protecting data at rest. Visit the lesson page for more learning resources.

1. E-discovery rules have come to the forefront recently because of a change to which key guideline?

  1. Gramm-Leach-Bliley
  2. California SB-1386
  3. Federal Rules of Civil Procedure
  4. PCI Data Security Standard

2. Within an enterprise, which group should be the key stakeholder in an e-discovery effort?

  1. Information security
  2. Storage and database teams
  3. Legal
  4. Finance

3. Which process is critical to the overall integrity of an e-discovery services project?

  1. Destroying all unnecessary data as quickly as possible
  2. Maintaining all mission-critical data for at least seven years
  3. Having formalized, repeatable e-discovery processes
  4. Maintaining a list of the top five system/data types and their business owners

4. Fill in the blank: Security pros can gain instant respect and credibility with storage pros if they are able to ___________ .

  1. configure a SAN
  2. speak in storage terminology
  3. understand the security limitations of legacy storage devices
  4. override NAS security protocols

5. Fill in the blank: When working with the storage team to decide how to encrypt certain data, if a certain data element is not sensitive, __________ .

  1. force storage managers to encrypt it anyway
  2. don't encrypt it if storage managers understand the associated business process
  3. encrypt it, but make the encryption keys more freely available
  4. don't require that it be encrypted

If you answered two or more questions incorrectly, revisit the materials from the lesson Enterprise strategies for protecting data at rest:

  • Tip: Discovering e-discovery: How information security pros should prepare
  • Podcast: Countdown - Top five ways to get storage and security teams working together

    If you answered four or more questions correctly, return to SearchSecurity.com's Data Protection Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.


  • Email Alerts

    Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
     

    COMMENTS powered by Disqus  //  Commenting policy