Quiz: Enterprise strategies for protecting data at rest

A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.

SearchSecurity.com Security School

This tip is part of SearchSecurity.com's Data Protection Security School lesson, Enterprise strategies for protecting data at rest. Visit the lesson page for more learning resources.

1. E-discovery rules have come to the forefront recently because of a change to which key guideline?

  1. Gramm-Leach-Bliley
  2. California SB-1386
  3. Federal Rules of Civil Procedure
  4. PCI Data Security Standard

2. Within an enterprise, which group should be the key stakeholder in an e-discovery effort?

  1. Information security
  2. Storage and database teams
  3. Legal
  4. Finance

3. Which process is critical to the overall integrity of an e-discovery services project?

  1. Destroying all unnecessary data as quickly as possible
  2. Maintaining all mission-critical data for at least seven years
  3. Having formalized, repeatable e-discovery processes
  4. Maintaining a list of the top five system/data types and their business owners

4. Fill in the blank: Security pros can gain instant respect and credibility with storage pros if they are able to ___________ .

  1. configure a SAN
  2. speak in storage terminology
  3. understand the security limitations of legacy storage devices
  4. override NAS security protocols

5. Fill in the blank: When working with the storage team to decide how to encrypt certain data, if a certain data element is not sensitive, __________ .

  1. force storage managers to encrypt it anyway
  2. don't encrypt it if storage managers understand the associated business process
  3. encrypt it, but make the encryption keys more freely available
  4. don't require that it be encrypted

If you answered two or more questions incorrectly, revisit the materials from the lesson Enterprise strategies for protecting data at rest:

This was last published in May 2007

Dig Deeper on Data security strategies and governance

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.