Get started Bring yourself up to speed with our introductory content.

Quiz: Must-have compliance technologies

A five-question multiple-choice quiz to test your understanding of the content presented by expert Trent Henry in this lesson of's Compliance School. Security School
This quiz is part of's Compliance School lesson, Must-have compliance technologies. Visit the lesson page for more learning resources.

1. For which compliance requirement should large enterprises be planning over the next six to 18 months?

  1. Japan's equivalent to Sarbanes-Oxley ("JSOX")
  2. A potential U.S. federal breach disclosure act
  3. The aftermath of PCI DSS deadlines
  4. All of the above

2. What is the ideal location for data leakage controls in order to help prevent improper release of sensitive customer data?

  1. Only around the database
  2. Around the database, in the network, and on end hosts
  3. Only in the network
  4. Only on end hosts

3. Because auditors are required to assess controls independently, organizations risk failing audits by talking to them in advance about technology plans for compliance.

  1. True
  2. False

4. Why is security compliance orchestration software helpful for compliance efforts?

  1. Because in addition to technology, 50% of controls that need to be assessed are non-technical
  2. Because most regulations require improved information availability, which can't be handled by other offerings
  3. Because most organizations have allocated compliance budget that still needs to be spent
  4. Because host-specific controls, like password policies, don't need to be examined

5. Which type of encryption control best protects mobile systems from breach disclosure compliance requirements?

  1. User-configured file & folder encryption
  2. Whole-disk encryption
  3. Network transport encryption
  4. Columnar database encryption

If you answered two or more questions incorrectly, revisit the materials from the lesson, Must-have compliance technologies:

  • Video: Bringing compliance under control: Key technologies to consider
  • Tip: Considerations for encryption and compliance
  • Bonus tip: Dissecting compliance workflow processes
  • Podcast: Fact or fiction: Building upon existing compliance infrastructure to meet new obligations
  • Dig Deeper on Audit and compliance planning

    Start the conversation

    Send me notifications when other members comment.

    Please create a username to comment.