Exam Tips Flashcards

(25 cards)

1
Q

What is the CCPA?

A

California consumer privacy act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the ISO 27701?

A

Data privacy controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the GDPR?

A

General data protection regulations
Privacy EU, multinational overseas data roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the data owner do?

A

Access and sharing policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the data custodian do?

A

Stores, manages, backing up and encrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the data controller do?

A

Writes policy on data handling and processing data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the data processor do?

A

Processes data according to the data controllers policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the Data privacy officer do?

A

Ensures data compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is L2TP/IPsec VPN?

A

Home to work tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is L2TP/IPsec site to site vpn?

A

Point to point, always on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is CASB?

A

Cloud access security broker
Maintains visibility and security over cloud devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT IS FDE and what are critical to its implementation?

A

Full disk encryption
Key escrow
TPM (TRUSTED PLATFORM MODULE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a WAF? What can it protect against?

A

Web application firewall
Buffer overflows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a DLP do?

A

Monitors, detects, and prevents the unauthorized transfer of sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Private vs confidential?

A

Private is for an individual
Congidentialnis for a group

17
Q

What should you do if you need to upgrade an IoT?

A

Segment it from the network and then upgrade.

18
Q

What control is an acceptable use policy?

A

Preventative.

19
Q

What to do when a network device does not meet new encryption standards?

20
Q

What control is used when a firewall allows connections from only specific internal ip addresses?

A

Compensating control

21
Q

How to monitor attack strategies?

A

Honeypot, isolated from production server.

22
Q

What is a host based firewall?

A

Set up to individual computers and hosts to monitor internal traffic.

23
Q

What security protocol secure communications over ip network

24
Q

What is social engineering?

A

Manipulating an individual to give out classified info.

Phishing is sent to everyone.

25
What can be used to harden a router?
Web-based administration. Can get to it through a web based interface.