COURSE 6 – CYBER THREAT INTELLIGENCE

Module 2: Data Loss Prevention and Mobile Endpoint Protection

IBM CYBERSECURITY ANALYST PROFESSIONAL CERTIFICATE

Complete Coursera Study Guide

INTRODUCTION – Data Loss Prevention and Mobile Endpoint Protection

In this comprehensive module, you will delve into the vital realms of data loss prevention tools and associated risks, alongside the strategic management of mobile endpoints. Through meticulous exploration, you will gain invaluable insights into safeguarding sensitive information, mitigating potential threats, and optimizing the security posture of mobile devices within organizational frameworks.

This module equips you with the essential knowledge and skills to navigate the complex landscape of data protection and endpoint management with confidence and efficacy.

Learning Objectives

  • Manage mobile endpoint security using IBM MaaS360
  • Explain day-to-day mobile endpoint management
  • Discuss the available security options for mobile endpoints
  • Describe the primary vulnerabilities of mobile endpoints
  • Describe Guardium as an example of a data protection solution
  • Identify the 12 critical capabilities for a data protection solution
  • Identify industry-specific data security challenges
  • Discuss common pitfalls in data security
  • Describe common data security challenges
  • Define data protection and security and explain its purpose

DATA SECURITY AND PROTECTION KNOWLEDGE CHECK

1. A student’s grades should be visible to that student when she logs in to her university account. Her ability to see her grades is an example of which aspect of the CIA Triad?

  • Authorization
  • Integrity
  • Confidentiality
  • Availability (CORRECT)

2. A university has implemented practices that ensure all student data are encrypted while stored on university servers. Which aspect of the CIA Triad does this practice support?

  • Availability
  • Authorization
  • Confidentiality (CORRECT)
  • Integrity

3. The Student Portal of a university issues a confirmation code with a hash value each time a student submits an assignment using the portal. This is an example of which aspect of the CIA Triad?

  • Confidentiality
  • Availability
  • Integrity (CORRECT)
  • Authorization

4. True or False. An organization has “air gapped” its small network of critical data servers so they are accessible internally but not to any external system. These systems are now safe from a deliberate attack.

  • True
  • False (CORRECT)

5. C-level executives face 4 challenges when assuring their organizations maintain a comprehensive, workable data security solution. The proliferation of smartphones used for work would impact which two (2) of these concerns the most? (Select 2)

  • A cybersecurity skills shortage
  • Explosive data growth (CORRECT)
  • Operational complexity
  • New privacy regulations (CORRECT)

6. True or False. An organization is subject to both GDPR and PCI-DSS data security regulations and has dedicated all of its efforts in remaining in compliance with these 2 sets of regulations. They are correct in believing that their data is safe.

  • True
  • False (CORRECT)

7. True or False. A newly hired CISO made the right choice when he moved the Known Vulnerabilities list to a high priority for his team to resolve even though none of these had ever been exploited on the company’s network to-date.

  • True (CORRECT)
  • False

8. All industries have their own unique data security challenges. Which of these industries has a particular concern with HIPAA compliance and the highest cost per breached record?

  • Retail
  • Financial
  • Transportation
  • Healthcare (CORRECT)

9. All industries have their own unique data security challenges. Which of these industries has a particular concern with being targeted more than any other by cybercriminals “because that is where the money is”?

  • Financial (CORRECT)
  • Healthcare
  • Transportation
  • Retail

10. Which three (3) of these are among the top 12 capabilities that a good data security and protection solution should provide? (Select 3)

  • Data discovery (CORRECT)
  • Role based access control
  • Data risk analysis (CORRECT)
  • Blocking, masking and quarantining (CORRECT)

Partially correct!

11. Parsing discovered data against known patterns or key words is a process known as what?

  • Data risk analysis
  • Data classification (CORRECT)
  • Vulnerability assessment
  • Data discovery

12. Which data protection process takes data activity monitoring output and uses it to generate insights about threats?

  • Data classification
  • Active analytics (CORRECT)
  • Data discovery
  • Vulnerability assessment

13. True or False. The IBM Guardium administrator needs to be someone with the highest level of access to the data being protected?

  • True
  • False (CORRECT)

MOBILE ENDPOINT PROTECTION KNOWLEDGE CHECK

1. Which mobile operating system runs the majority of smartphones today?

  • iOS
  • Android (CORRECT)
  • Blackberry
  • Windows

2. Which mobile operating system runs approximately 60% of tablet computers worldwide?

  • iOS (CORRECT)
  • Blackberry
  • Windows
  • Android

3. True or False. Security is enhanced on iOS mobile devices because users typically cannot interact directly with the operating system.

  • True (CORRECT)
  • False

4. Which statement best describes the use of anti-virus software on mobile devices?

  • Mobile devices provide native security that makes additional anti-virus software unnecessary.
  • Antivirus software is very effective on mobile devices because it can inspect the data that is associated with each app that is running.
  • Antivirus software can “see” the apps that are running on a mobile device but cannot see the data that is associated with each app. (CORRECT)
  • Antivirus software is very effective on mobile devices because it can inspect the data that is associated with each app but only while the app is not running.

5. Which type of threat is Jailbreaking?

  • External
  • System based (CORRECT)
  • Internal
  • App based

DATA LOSS PREVENTION AND MOBILE ENDPOINT PROTECTION GRADED ASSESSMENT

1. Which mobile operating system was originally based on the Linux kernel?

  • Android (CORRECT)
  • Blackberry
  • Windows
  • iOS

2. Which two (2) mobile operating combined dominate the vast majority of the smartphone market? (Select 2)

  • iOS (CORRECT)
  • Windows
  • Blackberry
  • Android (CORRECT)

Partially correct!

3. True or False. Security is enhanced on Android mobile devices because users interact directly with the operating system.

  • True
  • False (CORRECT)

4. What is one limitation to the operation of anti-virus software running on mobile devices?

  • Mobile devices provide native security that makes additional anti-virus software unnecessary.
  • Antivirus software is very effective on mobile devices because it can inspect the data that is associated with each app but only while the app is not running.
  • Antivirus software must be granted permission to inspect each app on a device.
  • Antivirus software can “see” the apps that are running on a mobile device but cannot see the data that is associated with each app. (CORRECT)

5. On a mobile device, which type of threat is a phishing scam?

  • External
  • Internal
  • App based (CORRECT)
  • System based

6. A university uses clustered servers to make sure students will always be able to submit their assignments even if one server is down for maintenance. Server clustering enables which aspect of the CIA Triad?

  • Confidentiality
  • Availability (CORRECT)
  • Integrity
  • Authorization

7. A university has enabled WPA2 encryption on its WiFi systems throughout the campus. Which aspect of the CIA Triad is directly supported by this action?

  • Integrity
  • Confidentiality (CORRECT)
  • Availability
  • Authorization

8. A student can see her grades via her school’s Student Portal but is unable to change them. This restriction is in support of which aspect of the CIA Triad?

  • Confidentiality
  • Integrity (CORRECT)
  • Authorization
  • Availability

9. True or False. An operator who corrupts data by mistake is considered an “inadvertent attack” that should be considered when developing data protection plans.

  • True (CORRECT)
  • False

10. C-level executives face 4 challenges when assuring their organizations maintain a comprehensive and workable data security solution. GDPR, CCPA, and PCC-DSS are concerned with which one of these challenges?

  • A cybersecurity skills shortage
  • Operational complexity
  • Explosive data growth
  • New privacy regulations (CORRECT)

11. True of False. A biotech research company with a very profitable product line has grown so rapidly it has acquired a marketing company, a small IT services company and a company that specializes in pharmaceutical manufacturing and distribution.  The CEO of the parent company made a good decision when he decided not to consolidate all data security under a single CISO, believing that each of the new divisions understands its own data security needs better than the parent company possibly could.

  • True
  • False (CORRECT)

12. Which three (3) of these are among the 5 common pitfalls of data security? (Select 3)

  • Failure to address known vulnerabilities (CORRECT)
  • Failure to decentralize the data security function
  • Failure to prioritize and leverage data activity monitoring (CORRECT)
  • Failure to move beyond compliance (CORRECT)

Partially correct!

13. All industries have their own unique data security challenges. Which of these industries has a particular concern with a widely distributed IT infrastructure that must provide services across a multiple government jurisdictions while not violating the privacy concerns of its users?

  • Healthcare
  • Transportation (CORRECT)
  • Retail
  • Financial

14. Which three (3) of these are among the top 12 capabilities that a good data security and protection solution should provide? (Select 3)

  • Encryption (CORRECT)
  • Data classification (CORRECT)
  • Incident management
  • Data and file monitoring (CORRECT)

Partially correct!

15. Which is the data protection process that addresses inappropriate privileges, insecure authentication methods, account sharing, configuration files and missing security patches?

  • Data risk analysis
  • Vulnerability assessment (CORRECT)
  • Data classification
  • Data discovery

16. Which data protection process substitutes key data with a token that is issued by a trusted third-party where the token can be accessed but not redeemed by an untrusted party?

  • Data classification
  • Data discovery
  • Tokenization (CORRECT)
  • Substitution

17. IBM Guardium provides heterogeneous data source support. This support results in which capability?

  • Each data repository can maintain a unique security policy
  • Similar security capabilities can be applied to different types of data repositories (CORRECT)
  • Different security policies can be applied against data of the same type
  • There is support for both structure and unstructured data sources

CONCLUSION – Data Loss Prevention and Mobile Endpoint Protection

In conclusion, mastering the concepts covered in this module is crucial for any organization aiming to uphold the integrity and security of its data assets while effectively managing the proliferation of mobile endpoints.

By understanding the nuances of data loss prevention tools and associated risks, as well as implementing robust strategies for mobile endpoint management, professionals can proactively safeguard against potential breaches and ensure compliance with regulatory standards. Armed with this knowledge, individuals are empowered to navigate the evolving landscape of cybersecurity with vigilance and adaptability, thereby fortifying their organization’s defenses in an increasingly interconnected digital world.