Time
2 hours 9 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Welcome back to Assets Security Course in this video, we're going to do a short one and check about protecting data. So whatever you have learned in previous three videos,
00:10
you now have the opportunity to check your current learning.
00:16
So first question is what ideal PC protection shouldn't include. So what shouldn't be the part off ideal PC protection
00:27
is its after the tracks. Malicious site success by user?
00:31
Is it hard for security model or is it anti malware software?
00:39
And the correct answer is software that tracks malicious sites. Access by user is definitely not something that you need on your PC if you want ideal
00:49
protection.
00:51
So the second question is working. Older date to be found
00:57
Is it on user specie and on server?
01:00
Is it on? Isn't on user specie or in storage?
01:06
Or is it amuses DeSean and in transit?
01:14
And the correct answer is on user's PC and in storage. So if it's still in server, it is not considered to be older data.
01:23
And the final question in this land check
01:27
is what is not the way to protect the data in the cloud.
01:33
Is it to flag sensitive data to control access
01:38
or to do encryption,
01:45
and the cramp taxer is equipped encryption. You don't need to encrypt data in the club.

Up Next

Asset Security Fundamentals

As a cybersecurity professional, it's often your responsibility to set security standards for your organization. In the Asset Security Fundamentals course, you will identify what types of assets need protection and the job roles that are involved.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor