Domain 2 - Asset Security Flashcards

1
Q

What are the commercial data classifications? (From Grave Damage to No damage)

A
  1. Proprietary/Confidential
  2. Private
  3. Sensitive
  4. Public
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the US Government Data Classification?

A
  1. TOP SECRET
  2. SECRET
  3. COMMERCIAL
  4. Unclassified
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What principle of security does compartmentalisation apply?

A

Need-to-know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What activities are used to assist an organisation in forming a minimum security baseline?

A

Scoping and tailoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is scoping?

A

Process of determining which portions of a standard will be used by the organisation. Example is the Statement of Applicability (SoA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is tailoring?

A

Tailoring is the process of customising a standard for a organiation:
1. control selection for initial security baseline
2. scoping for the remaining baseline security controls
3. Application of compensating controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is pseudonymisation?

A

De-identification process to remove PII.
This can be reversed as it is like an alias.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is anonymisation?

A

Process to either encrypt or remove PII. This is irreversible. However data inference can still be used to counter anonymisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is tokenisation?

A

A value that is substituted to replace a sensitive data item. e.g. payment card data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should asset classification be based on?

A

This should be based on the data classification. If it processes SECRET data then the computer should be classified the same.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should PHI, PII, financial data, employee data, payroll data be classified as?

A

Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the role of the system owner?

A
  • Creation of SSP
  • Ensures users receive adequate training
  • Assists with identification, implementation and assessment of common security controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of business/mission owners?

A
  • Senior executives that make the policies that govern the data security.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of data controllers?

A

Controllers create and manage sensitive data in the organisation (e.g. HR/Payroll)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of data processors?

A

Processors manage the data for controllers (e.g. outsourced payrolll)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the role of data owners?

A

They assign sensitivity labels and backup frequency.

17
Q

What is the responsibility of security administrators?

A
  • Firewalls
  • IPS
  • IDS
  • Security patches
  • Create accounts
  • Assigns access to data (could also be data administrator).
18
Q

What is PROM?

A

This is programmable read only once memory

19
Q

What is EPROM?

A

This is erasable programmable read only memory where reprogramming can be done many times using ultraviolet light.

20
Q

What is EEPROM?

A

Electrically erasable programmable read only memory. Reprogrammable using electric charges.

21
Q

What type of RAM is usually embedded with CPU?

A

Static RAM (SRAM)

22
Q

What type of RAM is inserted into motherboard slots?

A

Synchronous Dynamic RAM (SDRAM). This is where DDR4, etc comes in.

23
Q

What type of RAM is embedded on graphic cards?

A

Dynamic RAM (DRAM)

24
Q

Whare are SSD Drives made up of?

A

EEPROM and DRAM

25
Q

What is flash memory made up of? (e.g USB)

A

EEPROM

26
Q

What is an example of tailoring?

A

A standard or framework might say to use AES 128bit. Tailoring could be using a stronger encryption such as AES 256bit.