Your organization is exploring data-loss prevention (DLP) solutions. The proposed solution is a software network solution that would be installed near the network perimeter to monitor for and flag policy violations. This solution is targeting which of the following data states?
a. In-transit
b. At-rest
c. In-use
d. In-arrival
Answer: A
Protection of data in-transit is considered to be a network solution and either a hardware or software solution is installed near the network perimeter to monitor for and flag policy violations. Answer B is incorrect because protection of data at-rest is considered to be a storage solution and is generally a software solution that monitors how confidential data is stored. Answer C is incorrect because protection of data in-use is considered to be an endpoint solution and the application is run on end-user workstations or servers in the organization. Answer D is incorrect because there is no such data state.
Learn More :
Disaster Recovery and Incident Response
- There have been some sporadic connectivity issues on the network. Which of the following is the best choice to investigate these issues?
- Your organization is exploring data-loss prevention (DLP) solutions. The proposed solution is a software storage solution that monitors how confidential data is stored. This solution is targeting which of the following data states?
- Which of the following designates the amount of data loss that is sustainable and up to what point in time data recovery could happen before business is disrupted?
- Which risk management response is being implemented when a company purchases insurance to protect against service outage?
- With five nines availability, the total amount of downtime allowed per year is:
- Which redundancy strategy has one spare part for every component in use?
- The only difference between mirroring and which of the following is the addition of one more controller card?
- What is the maximum number of drive failures a RAID 5 array can survive from and still be able to function?
- What is another name for working copies?
- Which of the following outlines those internal to the organization who have the ability to step into positions when they open?
- With high availability, the goal is to have key services available 99.999 percent of the time. What is this availability also known as?
- Which of the following is the measure of the anticipated incidence of failure for a system or component?
- Which of the following would normally not be part of an incident response policy?
- Your company is about to invest heavily in an application written by a new startup. Because it is such a sizable investment, you express your concerns about the longevity of the new company and the risk this organization is taking. You propose that the new company agree to store its source code for use by customers in the event that it ceases business. What is this model called?
- Which agreement outlines performance requirements for a vendor?
- You've been brought in as a temporary for FRS, Inc. The head of IT assigns you the task of evaluating all servers and their disks and making a list of any data not stored redundantly. Which disk technology isn't fault tolerant?
- The process of automatically switching from a malfunctioning system to another system is called what?
- You're the head of information technology for MTS and have a brother in a similar position for ABC. The companies are approximately the same size and are located several hundred miles apart. As a benefit to both companies, you want to implement an agreement that would allow either company to use resources at the other site should a disaster make a building unusable. What type of agreement between two organizations provides mutual use of their sites in the event of an emergency?
- Which site best provides limited capabilities for the restoration of services in a disaster?
- You're a consultant brought in to advise MTS on its backup procedures. One of the first problems you notice is that the company doesn't utilize a good tape-rotation scheme. Which backup method uses a rotating schedule of backup media to ensure long-term information storage?
- Which backup system backs up all the files that have changed since the last full backup?
- You're trying to rearrange your backup procedures to reduce the amount of time they take each evening. You want the backups to finish as quickly as possible during the week. Which backup system backs up only the files that have changed since the last backup?
- Although you're talking to her on the phone, the sound of the administrative assistant's screams of despair can be heard down the hallway. She has inadvertently deleted a file that the boss desperately needs. Which type of backup is used for the immediate recovery of a lost file?
- Which plan or policy helps an organization determine how to relocate to an emergency site?