Quiz: Demystifying data encryption

A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School.

@26777 This tip is part of SearchSecurity.com's Data Protection Security School lesson, Data encryption demystified. Visit the lesson page for more learning resources.

1. Which of the following is a security advantage of database encryption?

  1. It enables organizations to meet compliance requirements.
  2. It makes it easy to protect the database from administrators.
  3. It provides protections against modification and deletion.
  4. It helps applications process data more quickly.

2. Which is not among the hidden security costs associated with software-based full-disk data encryption for workstations?

  1. Deployment costs
  2. Help desk costs
  3. Crashed hard drive data recovery costs
  4. Fines from privacy breaches due to a lost laptop

3. Fill in the blank: The five components of encryption key management are issuing, revising, revoking, _________ and recovery.

  1. reverifying
  2. backup
  3. remote logging
  4. reissuing

4. Fill in the blank: Data access, data retention, data security and data destruction are all components of ___________ .

  1. data encryption
  2. business processing
  3. data classification
  4. privacy breaches

5. Fill in the blank: The most important member of any data encryption security team should be the __________ .

  1. project manager
  2. information security staff
  3. IT help desk
  4. business unit(s) needing encryption

If you answered two or more questions incorrectly, revisit the materials from the lesson Data encryption demystified:

  • Tip: How to conduct a data classification assessment
  • Webcast: Data encryption demystified
  • Podcast: Fact or fiction: Pros and cons of database encryption

    If you answered four or more questions correctly, return to SearchSecurity.com's Data Protection Security School and begin another lesson, or try another school in SearchSecurity.com's Security School Course Catalog.

  • Read more on IT risk management