2 hours 9 minutes
Welcome back to Assets Security Course in this video, we're going to do a short one and check about protecting data. So whatever you have learned in previous three videos,
you now have the opportunity to check your current learning.
So first question is what ideal PC protection shouldn't include. So what shouldn't be the part off ideal PC protection
is its after the tracks. Malicious site success by user?
Is it hard for security model or is it anti malware software?
And the correct answer is software that tracks malicious sites. Access by user is definitely not something that you need on your PC if you want ideal
So the second question is working. Older date to be found
Is it on user specie and on server?
Is it on? Isn't on user specie or in storage?
Or is it amuses DeSean and in transit?
And the correct answer is on user's PC and in storage. So if it's still in server, it is not considered to be older data.
And the final question in this land check
is what is not the way to protect the data in the cloud.
Is it to flag sensitive data to control access
or to do encryption,
and the cramp taxer is equipped encryption. You don't need to encrypt data in the club.
Asset Security Fundamentals
As a cybersecurity professional, it's often your responsibility to set security standards for your organization. In the Asset Security Fundamentals course, you will identify what types of assets need protection and the job roles that are involved.