AND ANSWERS
Which of the following statements best describes how a Faraday cage prevents data
leakage?
It is used to prevent EMI from escaping the enclosure.
It is used in a crime scene to prevent the loss of data.
It is used in cable conduits to protect data during transmission.
It is used to trigger an alarm if data devices are removed from the area. - Answer- It is
used to prevent EMI from escaping the enclosure.
A large complex is being constructed on a restricted site. They require a very high-
speed, low maintenance (from a physical perspective) classified network. What type of
PDS should they install?
Secure carrier PDS
Hardened carrier PDS
Alarmed carrier PDS
Protected carrier PDS - Answer- Alarmed carrier PDS
Which of the following lists the data type in order from the type that needs the highest
level of protection to the lowest level?
Restricted, critical, intellectual property
Private, internal, regulated
Confidential, private, sensitive
Critical, trade secret, secret - Answer- Confidential, private, sensitive
Zaiden is asked to classify data elements based on certain criteria. Which of the
following best describes what Zaiden should take into consideration? Select two.
Criticality
Sensitivity
Secrecy
Confidentiality
Integrity - Answer- Confidentiality
Integrity
, A company designs an artifact. To secure protection against competitors who may
attempt to copy it, the company applies for, and is granted, a patent. What type of data
is being protected?
Trade secret
Restricted
Regulated
IP - Answer- IP
A large medical records archiving company adopts the slogan "Health Information
Protected Against Attackers" to try to convey medical records are secure. If the
organization suffers a significant data breach, who must they notify?
DHS
DHHS
HIPPA
HIPAA - Answer- DHHS
Which of the following examples best describes the states in which data could reside?
Select three.
Data that has been deleted and can no longer be recovered
Data that has been irreversibly corrupted by malware
Data sitting in RAM about to be transmitted
Data on a hard drive about to be accessed
Downloading an image from a website - Answer- Data sitting in RAM about to be
transmitted
Data on a hard drive about to be accessed
Downloading an image from a website
A company needs a lot of data to test an application. They want to make a copy of their
production data and modify it in such a way that the original data cannot be recovered.
Which of the following best describes the process the company should use to ensure
the privacy of the original data? Select two.
Data segmentation
Data tokenization
Data masking
Data sanitation
Data encryption - Answer- Data masking
Data sanitation
An individual who was recently fired goes to their former place of employment on a
weekend. Since they are unable to enter, security goes to the front door to inquire. The