Quiz: Must-have compliance technologies

A five-question multiple-choice quiz to test your understanding of the content presented by expert Trent Henry in this lesson of SearchSecurity.com's Compliance School.

SearchSecurity.com Security School
This quiz is part of SearchSecurity.com's Compliance School lesson, Must-have compliance technologies. Visit the lesson page for more learning resources.

1. For which compliance requirement should large enterprises be planning over the next six to 18 months?

  1. Japan's equivalent to Sarbanes-Oxley ("JSOX")
  2. A potential U.S. federal breach disclosure act
  3. The aftermath of PCI DSS deadlines
  4. All of the above

2. What is the ideal location for data leakage controls in order to help prevent improper release of sensitive customer data?

  1. Only around the database
  2. Around the database, in the network, and on end hosts
  3. Only in the network
  4. Only on end hosts

3. Because auditors are required to assess controls independently, organizations risk failing audits by talking to them in advance about technology plans for compliance.

  1. True
  2. False

4. Why is security compliance orchestration software helpful for compliance efforts?

  1. Because in addition to technology, 50% of controls that need to be assessed are non-technical
  2. Because most regulations require improved information availability, which can't be handled by other offerings
  3. Because most organizations have allocated compliance budget that still needs to be spent
  4. Because host-specific controls, like password policies, don't need to be examined

5. Which type of encryption control best protects mobile systems from breach disclosure compliance requirements?

  1. User-configured file & folder encryption
  2. Whole-disk encryption
  3. Network transport encryption
  4. Columnar database encryption

If you answered two or more questions incorrectly, revisit the materials from the lesson, Must-have compliance technologies:

  • Video: Bringing compliance under control: Key technologies to consider
  • Tip: Considerations for encryption and compliance
  • Bonus tip: Dissecting compliance workflow processes
  • Podcast: Fact or fiction: Building upon existing compliance infrastructure to meet new obligations
  • This was first published in March 2009

    Dig deeper on Audit and compliance planning

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchSecurity

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    ComputerWeekly

    Close