Section 3.3 Demonstrate your acquired knowledge about comparing and contrasting concepts and strategies to protect data. This will demonstrate your proficiency for section 3.3 of the Security+ SY0-701 objectives. 1 / 25 Which method ensures that tampered files are easily detectable? Encryption Hashing Tokenization Masking 2 / 25 Allowing access to data strictly based on roles and necessity is: Segmentation Permission restriction Tokenization Encryption 3 / 25 Dividing a network or database to limit the spread of breaches is: Masking Segmentation Geolocation Encryption 4 / 25 Making data intentionally difficult to interpret is called: Masking Obfuscation Tokenization Encryption 5 / 25 Protecting PII by substituting it with an unrelated value defines: Obfuscation Hashing Tokenization Geographic restriction 6 / 25 Replacing sensitive data with a fictional but realistic substitute is: Hashing Encryption Masking Segmentation 7 / 25 What security method produces a fixed-length, irreversible output? Tokenization Hashing Encryption Geolocation 8 / 25 The most common method of protecting the confidentiality of data is: Masking Encryption Obfuscation Segmentation 9 / 25 Preventing access to services based on user’s physical location uses: Masking Hashing Tokenization Geographic restrictions 10 / 25 Using GPS tagging in file metadata refers to concerns about: Data sovereignty Geolocation Permission restriction Public access 11 / 25 What concept forces companies to keep data within local borders? Data masking Data sovereignty Tokenization Hashing 12 / 25 Files temporarily loaded in RAM during processing are considered: Data at rest Data in use Data sovereign Private 13 / 25 Credit card information transmitted over a Wi-Fi network is: Data at rest Data sovereign Data in transit Public 14 / 25 Encrypted backup files sitting idle on a storage server are: Data in use Data in transit Data at rest Data sovereign 15 / 25 A classification used for high-priority systems essential to operations: Sensitive Restricted Critical Confidential 16 / 25 Health records protected under HIPAA typically fall under: Critical data Public data Private data Human-readable 17 / 25 Marketing material intended for public websites is classified as: Confidential Public Critical Private 18 / 25 Information affecting national security would likely be classified as: Private Public Restricted Intellectual 19 / 25 Which classification would a corporate R&D blueprint most likely carry? Public Restricted Confidential Critical 20 / 25 Data designed for machine consumption is considered: Sensitive Financial Private Non-human-readable 21 / 25 Transaction logs, payroll records, and invoices are examples of: Sensitive content Financial information Public documentation Intellectual property 22 / 25 Court case files handled by a law firm fall under: Public data Private data Legal information Trade secret 23 / 25 Copyrights and patents are forms of: Financial data Geolocation tracking Intellectual property Restricted data 24 / 25 A proprietary algorithm used internally would be classified as: Legal information Trade secret Public information Critical record 25 / 25 Which data type most commonly includes PII and financial records? Intellectual property Trade secret Human-readable Regulated Your score isThe average score is 0% 0% Restart quiz Return to CompTia N+ 10-009 Objectives