What is a common challenge that Data Security Posture Management (DSPM) tools aim to solve?
.
Apakah cabaran lazim yang cuba diselesaikan oleh alat Data Security Posture Management (DSPM)?
From Integrity to Exposure: A Modern cyber security approach
Quiz
•
Specialty
•
Professional Development
•
Medium
Chrisvito Arden
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is a common challenge that Data Security Posture Management (DSPM) tools aim to solve?
.
Apakah cabaran lazim yang cuba diselesaikan oleh alat Data Security Posture Management (DSPM)?
Malware protection
.
Perlindungan daripada perisian hasad
Tracking firewall performance
.
Menjejaki prestasi firewall
Identifying and protecting sensitive data in shared environments
.
Mengenal pasti dan melindungi data sensitif dalam persekitaran kongsi
Monitoring DNS traffic
.
Memantau trafik DNS
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
How can a school find out if internal sensitive student data is accessible from outside when it is not supposed to be?
.
Bagaimanakah sesebuah sekolah boleh mengetahui jika data pelajar dalaman yang sensitif boleh diakses dari luar walaupun ia tidak sepatutnya?
Continuously scan all storage and apps for exposed data
.
Imbas semua storan dan aplikasi secara berterusan untuk data yang terdedah
Block all USB devices on campus
.
Sekat semua peranti USB di kampus
Require students to use complex passwords
.
Wajibkan pelajar menggunakan kata laluan yang kompleks
Disable Wi-Fi after school hours
.
Lumpuhkan Wi-Fi selepas waktu sekolah
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
How long might it take to manually detect unauthorized system changes without proper FIM/SCM?
.
Tanpa alat FIM/SCM yang sesuai, berapa lama biasanya diambil untuk mengesan perubahan sistem tanpa kebenaran secara manual?
Minutes to hours with alerts
.
Beberapa minit hingga jam dengan sistem amaran
Days to weeks of manual log review
.
Beberapa hari hingga minggu melalui semakan log manual
Seconds with manual inspection
.
Beberapa saat dengan pemeriksaan manual
Never, since manual review is foolproof
.
Tak pernah, sebab semakan manual dianggap mencukupi
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
"Enforcing compliance with security policies and baselines."
Which solutions help the organization to perform this function?
.
"Menguatkuasakan pematuhan terhadap dasar dan garis panduan keselamatan.”
Penyelesaian manakah yang paling sesuai untuk fungsi ini?
Application Security Assessment
.
Penilaian Keselamatan Aplikasi
Continuous Threat Exposure Management (CTEM)
Security Configuration Management (SCM)
Data Security Posture Management (DSPM)
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
"After a new vulnerability is disclosed, it ranks vulnerabilities by exploitability and impact for prioritization."
Which solution performs this functionality?
.
"Selepas satu kelemahan keselamatan baru didedahkan, ia menyusun kelemahan berdasarkan keboleheksploitan dan impak untuk keutamaan."
Penyelesaian manakah yang menjalankan fungsi ini?
Security Configuration Management (SCM)
Continuous Threat Exposure Management (CTEM)
Data Security Posture Management (DSPM)
Application Security Assessment
.
Penilaian Keselamatan Aplikasi
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
"During a recent audit, your security team noticed unauthorized changes to the system."
Which tool would best help detect and alert on such changes in real time?
.
"Semasa audit baru-baru ini, pasukan keselamatan anda mengesan perubahan sistem tanpa kebenaran."
Alat manakah yang paling sesuai untuk mengesan dan memberi amaran tentang perubahan tersebut secara masa nyata?
Firewall
Continuous Threat Exposure Management (CTEM)
Data Security Posture Management (DSPM)
File Integrity Monitoring (FIM)
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
"The teachers of a school stores sensitive student data across multiple cloud platforms."
How can DSPM help?
.
"Guru-guru di sebuah sekolah menyimpan data pelajar sensitif merentasi pelbagai platform awan."
Bagaimanakah DSPM boleh membantu?
By tracking where sensitive data is stored and who has access using AI
.
Dengan menjejak lokasi simpanan data sensitif dan siapa yang mempunyai akses menggunakan AI
By blocking all external cloud connections
.
Dengan menyekat semua sambungan awan luar
By encrypting all files manually
.
Dengan menyulitkan semua fail secara manual
By limiting internet speeds for cloud users
.
Dengan mengehadkan kelajuan internet untuk pengguna awan
15 questions
[FAST TRACK] Android quiz 08 (03.06)
Quiz
•
Professional Development
9 questions
5 UNIT : Implementing the SMS-Key Roles and Accountabilities
Quiz
•
Professional Development
10 questions
P231 Sustainable Site Planning Process
Quiz
•
University - Professi...
10 questions
6 UNIT : Safety Culture
Quiz
•
Professional Development
12 questions
Quiz Unit 21
Quiz
•
Professional Development
10 questions
Pre Test Supply Chain Concept - JLDP 4.2
Quiz
•
Professional Development
10 questions
4 UNIT : Introduction to Safety Management System (SMS)
Quiz
•
Professional Development
6 questions
TTF Indovina chi? Whatsapp Edition!
Quiz
•
Professional Development
15 questions
Multiplication Facts
Quiz
•
4th Grade
20 questions
Math Review - Grade 6
Quiz
•
6th Grade
20 questions
math review
Quiz
•
4th Grade
5 questions
capitalization in sentences
Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance
Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions
Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines
Quiz
•
Professional Development
12 questions
Dividing Fractions
Quiz
•
6th Grade