Quiz: Must-have compliance technologies

SearchSecurity.com Security School
This quiz is part of SearchSecurity.com's Compliance School lesson, Must-have compliance technologies. Visit the lesson page for more learning resources.

1. For which compliance requirement should large enterprises be planning over the next six to 18 months?

  1. Japan's equivalent to Sarbanes-Oxley ("JSOX")
  2. A potential U.S. federal breach disclosure act
  3. The aftermath of PCI DSS deadlines
  4. All of the above

2. What is the ideal location for data leakage controls in order to help prevent improper release of sensitive customer data?

  1. Only around the database
  2. Around the database, in the network, and on end hosts
  3. Only in the network
  4. Only on end hosts

3. Because auditors are required to assess controls independently, organizations risk failing audits by talking to them in advance about technology plans for compliance.

  1. True
  2. False

4. Why is security compliance orchestration software helpful for compliance efforts?

  1. Because in addition to technology, 50% of controls that need to be assessed are non-technical
  2. Because most regulations require improved information availability, which can't be handled by other offerings
  3. Because most organizations have allocated compliance budget that still needs to be spent
  4. Because host-specific controls, like password policies, don't need to be examined

5. Which type of encryption control best protects mobile systems from breach disclosure compliance requirements?

  1. User-configured file & folder encryption
  2. Whole-disk encryption
  3. Network transport encryption
  4. Columnar database encryption

If you answered two or more questions incorrectly, revisit the materials from the lesson, Must-have compliance technologies:

  • Video: Bringing compliance under control: Key technologies to consider
  • Tip: Considerations for encryption and compliance
  • Bonus tip: Dissecting compliance workflow processes
  • Podcast: Fact or fiction: Building upon existing compliance infrastructure to meet new obligations

    This was first published in March 2009

  • There are Comments. Add yours.

    TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

    REGISTER or login:

    Forgot Password?
    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
    Sort by: OldestNewest

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to: