Architecture and Design Principles Flashcards

1
Q

Full operation within the company network with …

A

no data leaving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Minimal copying and storage of

A

personal data within the platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

No transmitting of personal information over a network in

A

the clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

No mandated sharing of

A

personal data with other systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Easy horizontal

A

scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Modern technology, portability, and ease of deployment. Leverage …

A

Docker containers, readiness for Kubernetes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BigID supports 2-node and

A

multiple node deployment model based on containers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Scanning and correlation are

A

horizontally scalable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In other words, scanners can be deployed remotely for … (4 items)

A
  • Faster scanning because the scanning is local
  • Reduces data traffic volume from remote locations
  • Easier network configuration (only inbound rule needed)
  • Safer operation since sensitive information doesn’t travel over far networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RabbitMQ is listening on 2 ports, which are the default ports when SSL is enabled

A
  • Port: 5671: amqp/ssl, purpose: AMQP 0-9-1 and AMQP 1.0 over TLS
  • Port: 15671: https, purpose: HTTP API over TLS (HTTPS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The BigID user interface is SSL-enabled, and uses

A

HTTPS on port 443 by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The default SSL certificate is self-signed and will

A

generate a browser warning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The web application runs client-side JavaScript code which communicates

A

with the server via REST API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Fundamental Processing Flow?

A

Scan ➤ Correlate ➤ Visualize ➤ Benefit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fundamental Processing Flow - Scan

A

Scan for personal information in various data sources, leveraging matching, classification and enrichment algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fundamental Processing Flow :: Correlate

A

Correlate personal information across data sources, and connect it back to the data subject identity.

17
Q

Fundamental Processing Flow - Visualize

A

Visualize relationships between data elements,

as well as the flow and processing of personal information across systems.

18
Q

Fundamental Processing Flow :: Benefit

A

Manage data subject consents and
on-demand access requests, and
reveal critical correlations in data breach scenarios.

19
Q

Discovery Methods :: Data Classification

A

Pattern matching on data values using regular expressions

20
Q

Discovery Methods :: Metadata Classification

A

Pattern matching on column names

21
Q

Discovery Methods :: Document Classification

A

Machine learning algorithms classifying and labeling documents by their type

22
Q

Discovery Methods :: Advanced Classification (Named Entity Recognition)

A

Machine learning algorithms looking for names, phones etc in unstructured data

23
Q

Discovery Methods :: Metadata Patterns

A

Analysis of permissions and metadata to identify over-exposed or suspect objects

24
Q

Discovery Methods - Correlation - Value Matching

A
  • Also called reference set, IDSoR

* Value-matching and ML correlation between identifying attributes in entity sources and actual data

25
Q

Discovery Methods - Correlation - Enrichment

A

Proximity analysis to look at nearby data

26
Q

Discovery Methods - Cluster Analysis

A

Identify duplicate and similar files by topic

27
Q

When this process reveals unknown personal data (i.e. “dark data”), the BigID ML automatically correlates this data to an entity based on parameters like uniqueness, proximity, frequency, etc, and then calculates the quality
of the correlation using only metadata and not the private data itself. This quality is reported as

A

Confidence level. Confidence levels are only calculated for structured data, not unstructured data.