Security Operations Flashcards

1
Q

Data handling process

A

Classification
Labeling - Data sensitivity labels, e.g. Highly restricted, low sensitivity
Retention
Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Primary uses of symmetric encryption

A

Encrypting bulk data (backups, hard drives, portable media)
Encrypting messages traversing communications channels (IPsec, TLS)
Streaming large-scale, time-sensitive data (audio/video materials, gaming, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Configuration Management process

A

Identify
Baselines
Updates
Patches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Handling policy

A

defines whether data is for use within the company, is restricted for use by only certain roles or can be made public to anyone outside the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Acceptable Use policy

A

defines acceptable use of the organization’s network and computer systems and can help protect the organization from legal action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Change Management Policy

A

It consists of three major activities: deciding to change, making the change, and confirming that the change has been correctly accomplished. Change management focuses on making the decision to change and results in the approvals to systems support teams, developers and end users to start making the directed alterations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the change management components?

A

Request for change
Approval
Rollback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three types of learning activities organizations use?

A

Education
Training
Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly