Domain 2: Memory and Remanence Flashcards

1
Q

Data that persists beyond noninvasive means to delete it.

A

Data Remanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data most frequently used by the CPU

A

Cache Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CPU onboard memory

A

Register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cache dedicated to a single processor core

A

Level 1/2 Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cache shared between cores

A

Level 3 Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cache located on the motherboard or on the GPU

A

Level 4 Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Memory that uses small latches called “flip-flops” to store bits
Fastest RAM

A

Static random-access memory (SRAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Memory that stores bits in small capacitors that hold a charge (representing 1 bit) or do not hold a charge (representing 0 bit)

A

Dynamic random-access Memory (DRAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ROM chip which contents aren’t burnt in during the manufacturing process. Instead allows the end user to burn in the chip contents later.
Once written no further changes are possible

A

Programmable read-only memory (PROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Category of PROM chips that allow content on a ROM chip to be erased

A

Erasable programmable read-only memory (EPROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Type of EPROM
ROM chip with a small window, that when illuminated with a special ultraviolet light cause the contents of the chip to be erased

A

Ultraviolet EPROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type of EPROM

ROM chip that uses eclectic voltages delivered to the pins of the chip to force contents to be erased

A

Electronically Erasable programmable read-only memory (EEPROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between EEPROM vs Flash memory?

A

EEPROM must be fully erased to be rewritten

Flash memory can be erased and written in blocks or pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSDs do not overwrite blocks that contain data, what does it do?

A

It writes data to unused block and marks the previous block as unallocated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two valid options for destroying data on SSD drives?

A

ATA Secure Erase

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data destruction method
Writes over every character of data on a disk
Allows for media reuse
i.e. zeroing out

A

Clearing or Overwriting

17
Q

Data destruction method

Repeats the clearing process multiple time and may combine it with other method

A

Purging

18
Q

Data destruction method

Uses a strong magnetic field to destroy the integrity of the data on a hard drive

A

Degaussing

19
Q

Data destruction method
Physically destroys the media device itself
i.e. incineration, shredding, acid chemicals, etc.

A

Destruction

20
Q

Memory that loses its contents when system enters an unpowered state

A

Volatile memory

21
Q

Memory retains it contents, even when there is no power to the system

A

Nonvolatile memory

22
Q

Is the same as memory

A

Primary storage

23
Q

Consists of magnetic, flash, and optical media that must be read into primary memory before the CPU can use the data

A

Secondary storage

24
Q

Data that can be read at any point

A

Random Access storage devices

25
Q

Requires scanning through all the data physically stored before the desired data location is brought up

A

Sequential access devices

26
Q

What are the three main security issues surrounding secondary storage devices?

A
  1. Removable media can be used to steal data
  2. Access controls and encryptions must be applied to protect data
  3. Data can remain on the media even after file deletion of media formatting
27
Q

What are some security risks posed that input/output devices can pose?

A
  1. Subject to eavesdropping and tapping
  2. Used to smuggle data out of an organization
  3. Can create insure point of entry into an organization’s system and networks