Chapter 5 Flashcards

1
Q

What physical security control describes a means that systems and cables from the classified network never physically touch systems and cables from the unclassified network.

A

Air Gap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three different ways to add data to a classified network?

A

Using a USB device
Unidirectional Network Bridge
Technical Guard Solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What method is a combination of hardware and software placed between two networks to transfer data?

A

Technical Guard Solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What data transfer method describes connecting two networks but only allows the data to travel in only one direction?

A

Unidirectional Network Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What term refers to the ongoing efforts to organize and care for data throughout its lifetime?

A

Data Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is placed on the edge of the network and can scan all outgoing data and prevent sensitive data from leaving the org.

A

Network-Based DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is usually placed on a system within an org, and can scan files sent to external devices, and store on a system to block unauthorize files from being on a sys or leaving a system.

A

Endpoint-Based DLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What NIST SP focuses on guidelines for media sanitizations?

A

NIST SP 800-88 Rev 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What describes unused space within a disk cluster?

A

Slack Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the best way to remove data remanence on a hard drive?

A

Degaussing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the best way to remove data remanence on a solid-state drive?

A

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What describes the use of IT resources without the approval or knowledge of the IT department?

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What method results in less stringent requirements with GDPR and can prevent data from directly identifying an entity.

A

Pseudonymization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What method is commonly used with ecommerce sites and credit card processors to protect users’ credit card data.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What NIST SP focuses on security control baselines?

A

NIST SP 800-53 Rev 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What NIST SP includes a comprehensive list of security controls and has identified many of them to include in various baselines.

A

NIST SP 800-53B

17
Q

What is part of the baseline tailoring process and refers to reviewing a list of baseline security controls and selecting only those controls that apply to the IT systems you’re trying to protect.

A

Scoping