Discuss the process of cleaning and securing data

Assignment Help Computer Engineering
Reference no: EM132242596

Questions: 1. The process of cleaning and securing data and getting it to the right people at the right time. Making sure that data is not redundant is generally referred to as:

A. Information Governance

B. Records Management

C. Master Data Management (MDM)

D. Data Governance

E. Either, A, B, C or D above as the terms are interchangeable

2. Which of the following would NOT be included among the recommendations that you would make to your company to improve security on its mobile devices?

A. Always encrypt sensitive data stored on the mobile device

B. Assess the security around your mobile application server

C. Require your user to re-enter his or her credential after a period of time even though it can be annoying and time consuming

D. Make sure your application developer has training on secure-coding training

E. None of the above is a correct answer since all are among the guidelines or tips or best practices for improving security for mobile devices

3. Which of the following are included among the reasons that continuous improvement is needed in the IG program once it has been implemented?

A. New technological capabilities that can streamline or reduce costs of IG

B. Because laws and regulations will not change as they relate to IG

C. Because the business plan or strategy or target market will change over time

D. A and C only are included among the reasons for continuously improving or changing the IG program once implemented

E. All A, B and C are included among the reasons for continuously improving or changing the IG program once implemented

4. An OAIS compliant repository will preserve:

A. The SIP and AIP

B. The PDI and its associated dissemination packets

C. The AIPs and associated packets

D. The SIP, AIP, DIP abut will discared the PDI

E. None of the above is a correct answer

5. Which of th ISO standards is the audit and certification standard recommended by the ISO?

A. ISO 14721

B. ISO 18492

C. ISO 16363

D. ISO/IEEE 1000 (2005)

E. None of the above since there is no actual standard that has been recommended for audit and certification

6. Which of the following has been characterized as among the greatest social media security threats that an enterprise faces?

A. The general lack of social media policy inside the organization

B. .Employees who create a potential insider threat because they fail to comprehend the negative impact that their behavior in posting to social media sites has on the organization

C. The casua use of public comments can create liability for the employer

D. All of the above are important threats to the organization that must be considered when developing a company social media policy

E. .None of the above is the correct answer since businesses can't be held accountable for what their employees do on social media such as facebook and twitter

7. SharePoint is considered "self-provisioned" in that it

A. It is typically deployed by business users with IT given the authority to create new repositories for information within that environment without the author's input or intervention

B. It is typically deployed by IT and new repositories are also generally created by IT only

C. It is typically deployed by IT with business users given the authority to create new repositories for information within that environment without IT input or intervention

D. It is typically deployed by business users with those business users also given the authority to create new repositories for information within that environment without input from any other authority

E. It can be created and deployed remotely, and in the cloud environment

8. Which of the following is not included among data base security best practices?

A. Make sure sensitive data is not encrypted

B. Integrate and automate standardized security processes

C. Hide live production data by masking test data

D. Use data loss prevention tools to map out data flaws in order do identify where your sensitive data resides

E. Monitor and document any configuration changes

9. Which of the following is/are true statement(s) concerning SharePoint?

A. The best way to deploy it is just through trial and error. Get used to it and familiarize yourself with it as part of deployment

B. Simply deploying SharePoint will resolve business issues such as compliance.

C. There is no need to "tailor" SharePoint to your organization. It is designed to work seamlessly with every organization right out of the box

D. A, B and C are all true of SharePoint

E. None of the above is a correct answer

10. SharePoint has the following capabilities:

A. Content repository

B. automate business processes

C. Help Organizations govern their information

D. Provides a collaboration platform

E. All of the above

11. is the process of blocking out sensitive fields of information.

A. Concatenation

B. Venue

C. Decatitnation

D. Redacting

E. Muting

12. The core of OAIS is a functional model that consists of entitles. One of those included entities is the :

A. 2; API's and PDI

B. 6; Ingest process

C. 4; ISO 13720

D. 3; Migration refreshment

E. None of the above is a correct answer

13. Type of system solutions employed to manage e-documents and records for security, auditing, searching, record retention and disposition, and version control which are predominantly repository based and provide for collaborative workspaces for unstructured information are referred to generally as

A. Enterprise Content Management Systems

B. IAM Systems

C. Information Governance Systems

D. Information Technology Systems

E. Data Model Frameworks

14. Which of the following are included among the main processes of the ValIT framework?

A. Investment Management

B. Portfolio Management

C. IT and Business Management

D. Value Governance

E. None of the above is the correct answer to the  since all of the above are among the processes of ValIT

15. can be described as separating infrastructure, applications and data into layers which permeates enterprise applications, coupled with an agile scalable infrastructure that make each enterprise a node in the cloud.

A. Hierarchical computing

B. Service-oriented architecture

C. Conceptual architecture

D. Data Framework architecture

E. None of the above

16. is an approach to email archival where email messages are retained for a limited time followed by their permanent, manual or automatic deletion.

A. Data Modeling

B. IAM systemizing

C. Comprehensive Modeling

D. Destructive Retention

E. Retentive Destruction

17. With regard to social media content, IG policies must be clear, and must employ real-time capture and management of blog posts since the content may change over time.

True

False

18. Federal Law that prohibits the unauthorized interception and disclosure of wire, oral or electronic communications.

A. Federal Wiretap Act

B. Stored Communications and Transactional Records Act

C. Electronic Communications Privacy Act

D. Children's Internet Protection Act

E. Children's Online Protection Act

19. You have been commissioned by a major health care provider who has a concern related to privacy and security but they still want to use some form of cloud computing. Which would you recommend?

A. Private Cloud

B. Community Cloud

C. Public Cloud

D. Hybrid Cloud

E. None of the above

20. The idea of using a hash digit algorithm to validate the integrity of electronic content after execution of media renewal activities that do not alter the underlying bit streams of electronic content is for the purpose of , as described in

A. insuring security of data; ISO 18492

B. Purposes of authenticity; ISO 18492

C. Security and Authenticity; both ISO 18492 and ISO 16363

D. Purposes of media retrieval; ISO 18492

21. can be described as a huge dump of email to mass storage, where the data is stored sequentially and is not compressed or indexed. Searching is difficult.

A. Email backups

B. Email archiving

C. Data scrubbing

D. Both A and B

E. All A, B and C fall within the definition generally

22. would be considered the first and best way logically to protect confidential information assets.

A. Install IDM software on the device

B. Removal of confidential, unnecessary or unneeded data from the mobile device

C. Use the device only behind a firewall

D. Put a password on the device

E. Use a device that has only SSD technology

23. The first step in SharePoint deployment is

A. Drafting the project schedule

B. Drafting the project charter

C. Drafting the formal SharePoint governance document

D. Employee training

E. Develop strategies and guidelines and put them on paper

24. Typically, an electronic records management system will include which of the following basic function(s)?

A. Access and Security Controls

B. Marking the e-document a read-only record to prevent corruption and alteration

C. Maintaining organizational/historical metadata

D. A and B above only as metadata is not permitted to be archived

E. A, B and C above

25. Your company had determined that in using cloud computing it has experienced information breaches that it does not believe is malicious, but is the result of lack of training and awareness, which causes the employees to accidentally compromise sensitive data. What would you recommend as a "fix" or partial fix for this problem?

A. Implementation of a DLS

B. Strong encryption

C. The use of secure storage, management and document destruction practices

D. Only B and C above

E. All A, B and C above

26. Type of API migration which occurs when one or more APIs are copied exactly to the same type of storage media with no alterations occurring in the packaging of information, the content information, the PDI, when there is a change to the AIP location and access archival storage mapping infrastructure

A. Repackage migration

B. Migration replication

C. Migration transformation

D. Migration refreshment

E. Migration assessment

27. In planning for SharePoint deployment and governance, after your business objectives are formed and your guiding principles are established, then the next step is to:

A. Determine the scope of deployment

B. Train your employees

C. Develop the business strategy

D. Identify the executive sponsor

E. Develop a formal deployment manual

28. is an approach to security that uses multiple layers of security mechanisms to protect information assets and reduce the likelihood that rogue attacks can succeed.

A. Missile defense

B. Defense in depth

C. Objective Defensive identity defense

D. All A, B and C would achieve the same objective

E. None of the above

29. How does social media differ from other communications and collaboration systems such as email and IM in a significant way?

A. The architecture of social media is different

B. The underlying assumptions are different in that social media tends to bring attention to the user's endorsement or rejection of content or ideas

C. Social Media Sites are more dynamic

D. There is essentially no differences between social media, email and IM

E. All A, B and C are differences

30. There are broad categories of digital preservation standards. They include:

A. 1, There is only one standard, namely OAIS

B. 2, the first is System infrastructure capabilities and the second is services that support trustworthy repositories and open standard technology-file formats

C. 3, OAIS, ISO 14721 and ISO ASCII

D. 4, PDI, SIP, DIP and AIP

E. There are an infinte number of standards

31. "Traditional" email system backups are exactly the same as email archiving software. So it makes no difference which you use, as long as you use one of the two.

True

False

32. In Japan, the word "Kaizen" is similar to CPI in the maintenance of the IG program effectiveness. It reflects the gradual and constant process of eliminating

A. Problems

B. The main causes of problems

C. Overhead costs

D. Unnecessary time related to IG

E. Wasted time

33. By comparison, which of the following types of archival information packet migration would have the greatest risk of potential loss of information?

A. Repackage migration

B. Migration replication

C. Migration transformation

D. Migration refreshment

E. Migration assessment

34. Which of the following would be a type of archival method for archival of one or more types of social media content?

A. TwInbox

B. ArchiveFacebook

C. SocialFolders

D. SocialSafe

E. All of the above

35. What is the difference between COBIT 4.1 and CobiT 5?

A. CobiT 5 does not include key principles for governance and management

B. CobiT 5 does not include enablers

C. CobiT 5 is a value oriented framework where COBIT 4.1 is a process based framework

D. CobiT 5 does not relate to the ISO standard whereas COBIT 4.1 does

E. None of the above is the correct answer

36. is a type of cloud computing service where the cloud infrastructure is made available to the general public or a large industry group and is owned by the organization selling cloud services.

A. Private Cloud

B. Community Cloud

C. Public Cloud

D. Hybrid Cloud

E. None of the above

37. Approach to data modeling often confused with MDM as it refers to data in categories and is used only to categorize other data found in a database

A. Physical Data Modeling

B. Conceptual data Modeling

C. Enterprise data modeling

D. Data Integration modeling

E. None of the above

38. Which of the following are among the most serious concerns regarding using cloud computing?

A. Security risks

B. Loss of direct IT control

C. Privacy concerns

D. Records management issues

E. All of the above are among the limitations or concerns related to cloud computing

39. One of your departmental managers tells you, "I am thinking about protecting our MicroSoft Office files by password protecting the files. I am told many organizations all over the world do this." What do you think? Do you see any downsides? Your best response is

A. Your are right, it is used all over the world. But make sure that you know what the password is because if the employee who creates the password leaves you are stuck because you can't retrieve it.

B. I don't think anybody has ever used it. It just doesn't exist with MicroSoft file applications

C. Sure go for it. I don't see any problems. It would be good with the number of employees who are coming and going these days

D. I don't think it will work of you are also using a firewall, so be careful

E. Yeah, its okay but you are limited to only 6 characters and it has weak securty

40. You use cloud computing solutions. Your company has discovered that the cloud provider's employee has stolen information from your compnay and has sold it to one of your competitors. What can you use to combat this in the future?

A. Implement DLP and IRM technology

B. Request an assessment of the supplier's practices and complete supply supply chain including the services that are subcontracted

C. Implement a firewall

D. Only A and B above will help with this problem

E. All A, B and C will minimize the risk of this happening again

41. Legal concept where emails are improperly destroyed and for that reason cannot be produced during discovery. The business that destroyed the email is punished by the Court. This is referred to as

A. Data scrubbing

B. Data de-redundancy

C. Spoilation

D. .Social Engineering

E. Phishing

42. is a type of problem created when the maintenance of identities does not keep up with the changing identitie of authorized users. This is combated by

A. Data Modeling, Firewalls

B. Data Scrubbing, Antivirus Software

C. Data de-redundancy, Anti-spyware software

D. Identity drag, IAM softwre

E. None of the above

43. The ISO defines "long term" in which of the following standards?

A. ISO 23434

B. ISO 14721

C. ISO/IEEE 803

D. ISO 9999

E. None of the above is a correct answer since the ISO stated that long term is not capable fo being defined.

44. For some unexplained reason, it appears that the popularity of mobile computing has appeared to decline over the past couple of years.

True

False

45. While it is teh CIO who has line responsibility for implementing IT governance, he/she is typically not the officer who should receive the reports and updates to discharge the responsibilities for IT governance and to see that the program is functioning well and providing business benefits.

True

False

46. You, a U.S. citizen wish to request a copy of Hillary Clinton's emails that have been disclosed to the U.S. Government, which were stored on her private server in her basement. You would most likely use which federal law to try to get access to these documents?

A. The Federal Wiretapping Act

B. The Federal Criminal Abuse Act

C. The Freedom of Information Act

D. The Whitewater Act

E. The Monica Lewenski Act

47. The PREMIS data model include semantic models. Included among them is the "Right" which involves :

A. 3, discrete units of information in digital for m that may exist as a bit stream, a file or a representation.

B. 5, actors in digital preservation that can be individuals, organizations, or software applications.

C. 4, the assertion of access rights and access privileges that relate to intellectual property, privacy or other related items.

D. 5, actions that involve at least one digital object and or agent known to the repository. Used to support the chain of custody of digital objects

E. None of the above

48. There is actually three layers of SharePoint solutions. The actually sits atop the and adds additional functionality and features.

A. SWW, MOSS

B. MOSS, WSS

C. MOSS, Microsoft Search Server

D. MicroSoft Search Server, WSS

E. WSS, Microsoft Search Server

49. The retention decision related to e-mail, along with other e-documents should ultimately rest with the IT department head.

True

False

50. THE ISO recommends protecting security of electronic records by

A. ISO 16363; creating a network monitoring system and implementing numerous routers

B. ISO 16363; creating a firewall between the electronic content outside the repository and the external users

C. ISO 18492; by creating a firewall between the electronic content in a repository and the network router

D. ISO 18492; by creating a firewall between the electronic content outside the repository and the external users

E. None of the above is the correct answer

Reference no: EM132242596

Questions Cloud

Describe elements related to the organization : Using an organization that you currently work for or have worked for previously, create a PowerPoint presentation with the following slides.
How does bringing a refinery plant online : How does bringing a refinery plant online/offline affect your profits? Why?
Explain the benefits of incorporating a disc stack : CENTRIFUGATION - CHEMICAL ENGINEERING UNIT OPERATIONS (II) - Teesside University - outline the principles behind the design and operation of one piece
Performance management supports organizational strategy : Explain how effective performance management supports organizational strategy and HR goals.
Discuss the process of cleaning and securing data : The process of cleaning and securing data and getting it to the right people at the right time. Making sure that data is not redundant is generally referred.
What factors likely contribute to common : What factors likely contribute to common, erroneous beliefs about affirmative action, even among intended beneficiaries?
High-low goals instead of using single number goals : What are advantages and disadvantages of using high-low goals instead of using single number goals?
Reach for a result or action from the company : Is there a better way for stakeholders to reach for a result or action from the company?
Compare the two main levels of financial benchmarking : Compare and contrast the two (2) main levels (i.e., internal comparison and external comparison) of financial benchmarking.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd