Domain 2: Asset Security Flashcards

1
Q

What is the information life cycle?

A

Information goes through a life cycle that starts with its acquisition and ends with its disposal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is new information prepared for use?

A

By adding metadata, including classification labels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the risk of data replication?

A

Ensuring the consistency of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an effect of data aggregation?

A

Data aggregation may lead to an increase in classification levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an effective control during the information life cycle?

A

Cryptography can be an effective control at all phases of the information life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What determines how information goes through the information life cycle?

A

The data retention policy drives the timeframe at which information transitions from the archival phase to the disposal phase of its life cycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why classify information?

A

Information classification corresponds to the information’s value to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What differentiates different information classification?

A

Each classification should have separate handling requirements and procedures pertaining to how that data is accessed, used, and destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who is ultimately responsible for an organization’s security?

A

Senior executives are ultimately responsible to the shareholders for the successes and failures of their corporations, including security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data owner

A

The data owner is the manager in charge of a specific business unit and is ultimately responsible for the protection and use of a specific subset of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data owners vs. data custodians

A

Data owners specify the classification of data, and data custodians implement and maintain controls to enforce the set classification levels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What consideratrions go into a data retention policy?

A

The data retention policy must consider legal, regulatory, and operational requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a data retention policy?

A

The data retention policy should address what data is to be retained, where, how, and for how long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

E-discovery

A

Electronic discovery (e-discovery) is the process of producing for a court or external attorney all electronically stored information (ESI) pertinent to a legal proceeding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NIST SP 800 - 88 , Revision 1

A

“Guidelines for Media Sanitization,” describes the best practices for combating data remanence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is overwriting data accomplished?

A

Overwriting data entails replacing the 1’s and 0’s that represent it on storage media with random or fixed patterns of 1’s and 0’s to render the original data unrecoverable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Degaussing

A

Degaussing is the process of removing or reducing the magnetic field patterns on conventional disk drives or tapes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data at rest

A

Data at rest refers to data that resides in external or auxiliary storage devices, such as hard drives or optical discs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do you protect data at rest?

A

Whole-disk encryption is a good way to protect data at rest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data in motion

A

Data in motion is data that is moving between computing nodes over a data network such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How is cryptography used to protect data in motion?

A
  • TLS
  • IPSec
  • VPNs
22
Q

Data in use

A

Data in use is the term for data residing in primary storage devices, such as:

  • Volatile memory (e.g. RAM)
  • Memory caches
  • CPU registers.
23
Q

Scoping

A

Scoping is taking a broader standard and trimming out the irrelevant or otherwise unwanted parts.

24
Q

Tailoring

A

Tailoring is when you make changes to specific provisions in a standard so they better address your requirements.

25
Q

Data leak

A

A data leak means that the confidentiality of the data has been compromised.

26
Q

Data leak prevention (DLP)

A

Data leak prevention (DLP) comprises the actions that organizations take to prevent unauthorized external parties from gaining access to sensitive data.

27
Q

Network DLP

A

Network DLP (NDLP) applies data protection policies to data in motion.

28
Q

Endpoint DLP

A

Endpoint DLP (EDLP) applies data protection policies to data at rest and data in use.

29
Q

You need to declassify a data asset. Where should you look for guidance?

A

Your organization’s policies and procedures.

30
Q

What is Data Leakage?

A

The unauthorized transmission of information to an external destination.

31
Q

In order to determine what information protection to apply to given information, what must you know first?

A

The classification level of the data.

32
Q

Erasing, purging, and degaussing are examples of what?

A

Data destruction.

33
Q

True or false: all data should be handled in the same manner.

A

False

Each classification level shold have separate handling requirements and procedures.

34
Q

Who should identify the classification of an information asset?

A

The information owner.

The information owner should:

  • Understand the organization’s classification scheme
  • Be familiar with legal and regulatory requirements
  • Carry out classification processes in a consistent manner
  • Have the processes reviewed
  • Carry out declassification processes when necessary.
35
Q

What is Asset Security?

A

The concept of identifying what assets you have and determine what types of controls are appropriate for each.

The types of assets and the types of controls should be defined in your organization’s policies, standards, and procedures.

36
Q

What is the best way to ensure data privacy?

A

Limit the amount of data collected.

37
Q

Who is responsible for checking to see if controls are being implemented properly?

A

Auditor.

38
Q

Complete this sentence: “The longer you keep data, …”

A

“…the more liable you are.”

Businesses should take into account the useful life of data and associated legal and regulatory requirements to determine how long data should be retained.

39
Q

Where should Data Marking be located on documents?

A

The cover and inside.

40
Q

What is Data Archival?

A

A copy of data that is no longer in use, used in case the data is needed sometime in the future.

41
Q

What are the four basic steps of the Information Life Cycle?

A
  • Acquisition
  • Classification and Marking
  • Use and Archival
  • Destruction

There are other life cycle models but this is the one we teach in the Human Element course.

42
Q

Labeling data with the classification level is an example of what?

A

Data Marking

43
Q

True or false: data is the only asset that needs to be classified.

A

False.

Applications and systems may also need to be classified.

44
Q

What is “single pass” data overwriting?

A

Data is overwritten once with a “1” or a “0”.

45
Q

After information is acquired by an organization what three steps should be taken?

A
  • Attach system metadata
  • Process metadata
  • Index the data

The data is indexed to facilitate searching.

46
Q

What is degaussing?

A

Magnetic scrambling of the data on a tape or disk.

47
Q

Who is responsible for maintaning data and implementing data controls?

A

Data Custodian.

48
Q

What is Data Remanence?

A

Residual representations of the data that remains after being erased.

49
Q

Roles and responsibilities for data classification should be contained in what document?

A

Data Classification Policy.

50
Q

What is a Data Backup?

A

A copy of data currently in use used for recovering from the loss of the original data.