Information Technology /CompTIA Sec+ SY0-701: Domain 3, Quiz 2

CompTIA Sec+ SY0-701: Domain 3, Quiz 2

Information Technology15 CardsCreated about 2 months ago

These flashcards cover key concepts in data security, such as encrypted data, geographic restrictions, and data classification for personal emails.

Which of the following is considered non-human-readable data?

a. Printed financial reports
b. Bar graph depicting quarterly profits
c. Encrypted email message
d. Organizational policy in PDF format

Encrypted email message

Encrypted email message is the correct answer because it is transformed into a format unreadable without decryption.

Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/15

Key Terms

Term
Definition

Which of the following is considered non-human-readable data?

a. Printed financial reports
b. Bar graph depicting quarterly profits
c. Encrypted email message
d. Organizational policy in PDF format

Encrypted email message

Encrypted email message is the correct answer because it is transformed into a format unread...

An organization wants to ensure that its data cannot be accessed outside the United States due to regulatory requirements. Which method would be most appropriate?

a. Geographic restrictions
b. Hashing
c. Tokenization
d. Encryption

Geographic restrictions

Geographic restrictions are correct because they enforce limitations based on the user’s geo...

In the context of data classifications, which type of data would likely include personal emails?

a. Restricted
b. Private
c. Public
d. Critical

Private

Private is the correct answer because it refers to personal data and is not meant for unauthorized viewing.<...

Which term describes data actively being processed or used by applications?

a. Data segmentation
b. Data in use
c. Data at rest
d. Data in transit

Data in use

Data in use is the correct answer because it refers to data currently being processed or utilized.

An organization is considering a backup solution where the backup data is immediately usable and can take over instantly in case of a primary system failure. Which site consideration is this?

a. Hot
b. Geographic dispersion
c. Cold
d. Warm

Hot

Hot is the correct answer because a hot site is ready for immediate activation with up-to-date data.

A company is considering a backup strategy that involves creating point-in-time representations of data that can be used for faster recovery. What are they considering?

a. Snapshots
b. Journaling
c. Replication
d. Frequency

Snapshots

Snapshots are the correct answer because they capture the state of data at a specific point in time.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Which of the following is considered non-human-readable data?

a. Printed financial reports
b. Bar graph depicting quarterly profits
c. Encrypted email message
d. Organizational policy in PDF format

Encrypted email message

Encrypted email message is the correct answer because it is transformed into a format unreadable without decryption.

An organization wants to ensure that its data cannot be accessed outside the United States due to regulatory requirements. Which method would be most appropriate?

a. Geographic restrictions
b. Hashing
c. Tokenization
d. Encryption

Geographic restrictions

Geographic restrictions are correct because they enforce limitations based on the user’s geographic location.

In the context of data classifications, which type of data would likely include personal emails?

a. Restricted
b. Private
c. Public
d. Critical

Private

Private is the correct answer because it refers to personal data and is not meant for unauthorized viewing.

Which term describes data actively being processed or used by applications?

a. Data segmentation
b. Data in use
c. Data at rest
d. Data in transit

Data in use

Data in use is the correct answer because it refers to data currently being processed or utilized.

An organization is considering a backup solution where the backup data is immediately usable and can take over instantly in case of a primary system failure. Which site consideration is this?

a. Hot
b. Geographic dispersion
c. Cold
d. Warm

Hot

Hot is the correct answer because a hot site is ready for immediate activation with up-to-date data.

A company is considering a backup strategy that involves creating point-in-time representations of data that can be used for faster recovery. What are they considering?

a. Snapshots
b. Journaling
c. Replication
d. Frequency

Snapshots

Snapshots are the correct answer because they capture the state of data at a specific point in time.

Which of the following is crucial for ensuring an organization has the necessary resources to handle future growth and demands?

a. Backups
b. Power
c. Capacity planning
d. High availability

Capacity planning

Capacity planning is the correct answer because it involves assessing future resource needs based on growth forecasts and other factors.

A company is moving its infrastructure to the cloud but wants to use AWS, Google Cloud, and Azure services for different operations. What approach is the company using?

a. Platform diversity
b. Multi-cloud systems
c. Load balancing
d. Geographic dispersion

Multi-cloud systems

Multi-cloud systems is the correct answer because it refers to using multiple cloud providers.

What data classification would be most appropriate for a company’s press releases that get shared openly?

a. Confidential
b. Public
c. Sensitive
d. Restricted

Public

Public is the correct answer because it pertains to data intended for open dissemination.

For a company wanting to ensure its application remains accessible even when several servers fail simultaneously, what concept should it focus on?

a. Tabletop exercises
b. Capacity planning
c. Continuity of operations
d. High availability

High availability

High availability is the correct answer because it is specifically about ensuring systems remain accessible despite failures.

Which strategy involves segmenting a network into smaller parts to improve performance and security?

a. Obfuscation
b. Tokenization
c. Segmentation
d. Encryption

Segmentation

Segmentation is the correct answer because it divides a network into separate parts or segments.

A company runs a sit-down test to determine how its staff responds to a hypothetical security breach by running a drill of the concept. What type of testing is the company employing?

a. Tabletop exercises
b. Failover
c. Parallel processing
d. Penetration Test

Tabletop exercises

Tabletop exercises are the correct answer because they involve discussions based on fictional scenarios to prepare for real-world events.

In which data state is information most vulnerable to unauthorized interception while being transferred between systems?

a. Data in transit
b. Data at rest
c. Data in use
d. Data sovereignty

Data in transit

Data in transit is the correct answer because it refers to data moving between systems or networks, making it susceptible to interception.

A company wants to hide the true nature of its data, making it hard for unauthorized individuals to understand, without changing the original data or using any keys. Which method would be most appropriate?

a. Hashing
b. Encryption
c. Tokenization
d. Obfuscation

Obfuscation

Obfuscation is the correct answer because it involves making the data or code more difficult to understand without altering its structure. For example, Base64 does not add to confidentiality.

What is the primary goal of using Uninterruptible Power Supply (UPS) systems in data centers?

a. Load balancing
b. Providing short-term power during outages
c. Monitoring equipment health
d. Cooling the equipment

Providing short-term power during outages

Providing short-term power during outages is the correct answer because UPS systems deliver power for a limited duration during power interruptions.