Quiz: Demystifying data encryption

A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School.

SearchSecurity.com Security School

This tip is part of SearchSecurity.com's Data Protection Security School lesson, Data encryption demystified. Visit the lesson page for more learning resources.

1. Which of the following is a security advantage of database encryption?

  1. It enables organizations to meet compliance requirements.
  2. It makes it easy to protect the database from administrators.
  3. It provides protections against modification and deletion.
  4. It helps applications process data more quickly.

2. Which is not among the hidden security costs associated with software-based full-disk data encryption for workstations?

  1. Deployment costs
  2. Help desk costs
  3. Crashed hard drive data recovery costs
  4. Fines from privacy breaches due to a lost laptop

3. Fill in the blank: The five components of encryption key management are issuing, revising, revoking, _________ and recovery.

  1. reverifying
  2. backup
  3. remote logging
  4. reissuing

4. Fill in the blank: Data access, data retention, data security and data destruction are all components of ___________ .

  1. data encryption
  2. business processing
  3. data classification
  4. privacy breaches

5. Fill in the blank: The most important member of any data encryption security team should be the __________ .

  1. project manager
  2. information security staff
  3. IT help desk
  4. business unit(s) needing encryption

If you answered two or more questions incorrectly, revisit the materials from the lesson Data encryption demystified:

This was last published in May 2007

Dig Deeper on Disk and file encryption tools