Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Recently, the Board of Water Supply installed wireless residential water meters across town. A homeowner intercepted the wireless water meter's signals at their home and

Recently, the Board of Water Supply installed wireless residential water meters across town. A homeowner
intercepted the wireless water meter's signals at their home and changed the water usage number to 10 times less
than what it really is. What do we call this?
A. DNS sinkhole B. data loss prevention (DLP) C. honeypot D. fake telemetry
Data is subject to the laws of the country where it is stored. What do we call this?
A. tokenization B. data loss prevention (DLP) C. data sovereignty D. information rights management
(IRM)
What is a removable or external security device you can add to a system to manage, generate and store RSA
keys used in asymmetric encryption?
A. network-based data loss prevention (DLP) B. information rights management (IRM)
C. hardware security module (HSM) D. Transport Layer Security (TLS) inspection
When you get your credit card bill, and it only shows the last four digits of your credit card number, what is this
called?
A. information rights management (IRM)
B.data masking
C. data loss prevention (DLP)
D. data sovereignty
This is between an organization's network and the Cloud Service Provider (CSP). It monitors network traffic and
can enforce network policies on the cloud.
A. network-based data loss prevention (DLP) B. Cloud Access Security Broker (CASB)
C. SSL/TLS inspection D. hardware security module (HSM)
What shows the physical arrangement and location of computer equipment?
A. standard naming conventions
B.diagrams
C. Internet protocol (IP) schema D.baseline configuration
What is not an important practice in configuration management (CM)?
A. diagrams B. standard naming conventions C.site resiliency D.baseline configuration
What is an alternate location for operations, which includes only the power and connectivity needed to be
operational within about a week?
A. Cold site
B. Warm site
C. Hot site
D. Cloud Access Security Broker (CASB)
is modifying data to hide the original content.
A. information rights management (IRM) B.data loss prevention (DLP) C. data masking D.data sovereignty
is the policies and technologies that are used to prevent the unauthorized transfer of data outside an
organization.
A. data sovereignty
B. information rights management (IRM)
C.data masking
D.data loss prevention
(DLP)
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

What advice would you provide to Jennifer?

Answered: 1 week ago

Question

What are the issues of concern for each of the affected parties?

Answered: 1 week ago