官术网_书友最值得收藏!

Sample questions

Q1. Which one of the following is not a cryptographic method for securing data?

  1. Encryption
  2. Digital media
  3. Hashing
  4. Digital signature

Q2. Which one of following is not a commonly used data state definition?

  1. Data at rest
  2. Data in the cloud
  3. Data in use
  4. Data in motion

Q3. Drag appropriate statements to the box on the right-hand side that pertain to the data handling policy of sensitive information, such as PII.

Q4. Which one of the following policies is the least secure? Place a tick mark on the appropriate circle.

主站蜘蛛池模板: 蒲城县| 阿图什市| 盈江县| 柳州市| 尼勒克县| 武定县| 鸡泽县| 普定县| 阳新县| 秭归县| 涿鹿县| 德格县| 成安县| 虎林市| 湘潭县| 阿合奇县| 龙井市| 当阳市| 赞皇县| 永平县| 金沙县| 崇州市| 武定县| 平舆县| 鄂托克旗| 河北区| 璧山县| 罗城| 长寿区| 洪湖市| 广平县| 茶陵县| 历史| 枣强县| 武乡县| 上思县| 安岳县| 射阳县| 定州市| 全南县| 湖南省|