Protecting Data Part 5: Learning Check

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
2 hours 39 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
Welcome back to Assets Security Course in this video, we're going to do a short one and check about protecting data. So whatever you have learned in previous three videos,
00:10
you now have the opportunity to check your current learning.
00:16
So first question is what ideal PC protection shouldn't include. So what shouldn't be the part off ideal PC protection
00:27
is its after the tracks. Malicious site success by user?
00:31
Is it hard for security model or is it anti malware software?
00:39
And the correct answer is software that tracks malicious sites. Access by user is definitely not something that you need on your PC if you want ideal
00:49
protection.
00:51
So the second question is working. Older date to be found
00:57
Is it on user specie and on server?
01:00
Is it on? Isn't on user specie or in storage?
01:06
Or is it amuses DeSean and in transit?
01:14
And the correct answer is on user's PC and in storage. So if it's still in server, it is not considered to be older data.
01:23
And the final question in this land check
01:27
is what is not the way to protect the data in the cloud.
01:33
Is it to flag sensitive data to control access
01:38
or to do encryption,
01:45
and the cramp taxer is equipped encryption. You don't need to encrypt data in the club.
Up Next