You are on page 1of 9

 Question 1

1 out of 1 points

A dual-layer DVD can hold up to about ________ GB.


Selected Answer: 8

 Question 2

1 out of 1 points

Adding invisible information to a file that can be used to identify its source is called
________.
Selected Answer: watermarking

 Question 3

1 out of 1 points

Another name for RAID 0 is ________.


Selected Answer: striping

 Question 4

1 out of 1 points

Another name for RAID 1 is ________.


Selected Answer: mirroring

 Question 5

1 out of 1 points
Another name for RAID 5 is ________.
Selected Answer: distributed parity

 Question 6

1 out of 1 points

Backup creation policies should specify ________.


Selected Answer: Both A and B

 Question 7

1 out of 1 points

Checkouts of backup media for restoration ________.


Selected Answer: Neither A nor B

 Question 8

1 out of 1 points

Companies address the risk of losing a security key by using ________.


Selected Answer: key escrow

encryption key resets

 Question 9

1 out of 1 points
Compared to local backup, centralized backup ________.
Selected Answer: Both A and B

 Question 10

1 out of 1 points

Configuring multiple hard drives as an array within a single system is ________.


Selected Answer: Both A and B

 Question 11

1 out of 1 points

DRM restricts what people can do with sensitive material.


Selected Answer: True

 Question 12

1 out of 1 points

DRM usually is difficult to enforce.


Selected Answer: True

 Question 13

1 out of 1 points

Encryption is usually fully transparent to the PC user.


Selected Answer: True

 Question 14
1 out of 1 points

File/directory data backup copies ________.


Selected Answer: Data

 Question 15

1 out of 1 points

Full backups are ________.


Selected Answer: All of the above

 Question 16

1 out of 1 points

Image backup is attractive because ________.


Selected Answer: it requires minimal additional work to restore a fully functioning PC

 Question 17

1 out of 1 points

In the long term, backup media should be stored at a different site.


Selected Answer: True

 Question 18

1 out of 1 points

Incremental and full backups must be restored in the order in which they were created.
Selected Answer: True

 Question 19

1 out of 1 points

Incremental backups are usually discarded after the next full backup.
Selected Answer: True

 Question 20

1 out of 1 points

Magnetic tape is ________.


Selected Answer: Neither A nor B

 Question 21

1 out of 1 points

Optical disks can safely hold data for decades.


Selected Answer: False

 Question 22

1 out of 1 points

Sanitation can protect against SQL injection attacks.


Selected Answer: True

 Question 23

1 out of 1 points
Spreadsheets are rarely the subject of compliance regulations.
Selected Answer: False

 Question 24

1 out of 1 points

The process of keeping a backup copy of each file being worked on by backing it up every
few minutes is called ________.
Selected Answer: shadowing

 Question 25

1 out of 1 points

Training users what not to put into e-mail messages is the most effective method of avoiding
problems during the legal discovery process.
Selected Answer: True

 Question 26

1 out of 1 points

Trusting users to do key escrow is risky because ________.


Selected Answer: All of the above

 Question 27

1 out of 1 points

Two computer systems each back up the other in real time in ________.
Selected Answer: CDP
 Question 28

1 out of 1 points

Which of the following database events should be regularly audited?


Selected Answer: All of the above

 Question 29

1 out of 1 points

Who should be involved in the creation of retention policies?


Selected Answer: Both A and B

 Question 30

1 out of 1 points

Wiping/clearing is the best approach to destroying media.


Selected Answer: False

 Question 31

1 out of 1 points

With RAID 1, the following is achieved:


Selected Answer: redundancy
 Question 32

1 out of 1 points

With RAID 5, the following is achieved:


Selected Answer: All of the above

 Question 33

1 out of 1 points

________ allows for very recent file changes to be restored.


Selected Answer: Shadowing

 Question 34

1 out of 1 points

________ backups only back up data that has changed since the most recent full backup.
Selected Answer: Incremental

 Question 35

1 out of 1 points

________ is an example of PII.


Selected Answer: Social Security number

 Question 36

1 out of 1 points
________ is the process of obscuring data such that it cannot identify a specific person, but
remains practically useful.
Selected Answer: Data masking

You might also like