0% found this document useful (0 votes)
148 views

Pass_Guardium_Data_Encryption_for_Technical_Sales_Level_3_Quiz.docx

Uploaded by

Justice Mutemwa
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views

Pass_Guardium_Data_Encryption_for_Technical_Sales_Level_3_Quiz.docx

Uploaded by

Justice Mutemwa
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

« Back to Guardium Data Encryption for Technical Sales Level 3 Quiz

Quiz navigation
Guardium Data Encryption
.
for Technical
- Sales Level 3 Quiz
Finish attempt ...
Question 1 In the demo, what is protected by Live Data Transformation?
Answer saved
O PII Files
Points out of
1.00 O Oracle Backup files

¢ Flag question O Oracle Database instance - Orclcdb

@© Oracle Database instance - Orasales

Clear my choice

«— Back to Guardium Data Encryption for Technical Sales Level 3 Quiz

Quiz navigation . . .
Guardium Data Encryption for Technical
i o Sales Level 3 Quiz
Finish attempt ...
Question 2 Which functionality is simulated in the demo by the back office
Answer saved application?

Points out of
O Database Encryption
1.00
o " @© Dynamic Data Masking
v Flag question
O Batch Data Transformation
O Live Data Transformation

Clear my choice
«— Back to Guardium Data Encryption for Technical Sales Level 3 Quiz

Quiz navigation . . .
Guardium Data Encryption for Technical
[EN[ien] e RN Sales Level 3 Quiz
Finish attempt ...
Question 3 What type of encryption key is used in the Linux-STD-Files-Policy
e of the Standard Data Encryption demo?

Points out of
O Private Key
1.00
© Asymmetric key
v Flag question
O Public Key

(@) Symmetric Key

Clear my choice

«— Back to Guardium Data Encryption for Technical Sales Level 3 Quiz

Quiz navigation
Guardium Data Encryption for Technical Sales Level 3 Quiz
S
Finish attempt ... Question 3 Which email address is used in the demo by the ransomware attacker to get the ransom?

Answer saved
[email protected]
O

Points out of
1.00 [email protected]
O

Flag question [email protected]


®

[email protected]
O

Clear my choice

Previous page Next page


— Back to Guardium Data Encryption for Technical Sales Level3 Quiz

Quiz navigation
Guardium Data Encryption for Technical Sales Level 3 Quiz
=
Finish attempt ... Question 4 In Live Data Transformation functionality, how many policies are required for initial encryption and
ArEEreEE) i
rekeying, and in which order? ?

Points out of O Initial encryption policy is installed first and then rekey policy overwrites after the initial encryption
1.00
B 2 separate policies, rekey policy first
¢ Flag question

O
Asingle Live Data Transformation policy for both initial encryption and subsequent rekeying

®
2 separate policies, initial encryption policy first

O
Clear my choice

Noxtpaes

You might also like