Siedel Chapter 2 Review Questions Flashcards

1
Q

Which of the following is not a common method of data discovery?

A. Content Based
B. User Based
C. Label Based
D. Metadata based

A

B. User Based

Explanation:
All the others are valid methods of data discovery’ user based is a red herring with no meaning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sara is planning to implement data labeling for her organization. Which of the following is not a data label field that she should consider?

A. Date data was created
B. Data owner
C. Data value
D. Date of scheduled destruction

A

C. Data value

Explanation:
The data creation date, the data owner, and the date of scheduled destruction might be included in data labels, but we dont usually include data value because it is prone to change frequently and it might not be information we want to disclose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sarah is continuing her data labeling efforts and has received suggestion for appropriate data labels for data that will be used in multiple countries in which her company operates as part of ongoing security and data lifecycle efforts. Which of the following is not a label that would help with that usage?

A. Source
B. Language
C. Handling restrictions
D. Jurisdiction

A

B. Language

Explanation:
While language may be useful for internal practices; it is not useful for lifecycle management or security functions. The source of the data, any handling restrictions and the jurisdiction in which the data was collected or used are all useful when dealing with data that may move between different countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Asha wants to document the path that data takes from creation to storage in her institutions database. As part of that effort, she creates a data flow diagram. Which of the following is not a common element of a data flow diagram?

A. Credentials used for each service listed
B. Hostnames and IP addresses or address blocks for each system involved
C. Ports and protocols used for data transfer
D. Security controls used at each point in the diagram

A

A. Credentials used for each service listed

Explanation:
Credentials are not typically included in documentation and should be kept in a secured location. Hostnames, IP addresses, ports, protocols and security controls are commonly documented in data flow diagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mei wants to conduct data discovery activities in her organization. Which of the following types of data discovery is best suited for identifying all photos that were taken using a specific model of camera based on the original files generated by the camera?

A. Label based
B. Metadata based
C. Extension based
D. Content based

A

B. Metadata based

Explanation:
Most cameras generate metadata about the images they create. Mei can rely on the metadata embedded in the original image files to conduct the discovery that she needs through her organizations files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Felix wants to monitor data transfers between two systems inside his IaaS cloud hosted data center. Which of the following mechanisms is unlikely to be available to him that is commonly available in on premises environments?

A. Log review
B. Packet capture
C. Data flow diagrams
D. Log correlation

A

B. Packet capture

Explanation:
Packet capture is often impossible in cloud hosted environments due to architectural and security reasons. Felix may want to identify another way to validate traffic flows for the data transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Megan is documenting roles as part of the implementation of her organizations’ data classification policy. Her organization uses a SaaS tool to accept applications from customers. What term best describes the SaaS vendor?

A. A data custodian
B. A data owner
C. A data processor
D. A data steward

A

C. A data processor

Explanation:
In legal terms, when data processor is defined, it refers to anyone who stores, handles, moves or manipulates data on behalf of the data owner or controller. In the cloud computing realm, particularly with software as a service tools, this is the cloud service providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Jamie has been informed of legal action against his company and must now ensure that data relevant to the case is kept. What term describes this?

A. Legal retention
B. Legal arching
C. Court hold
D. Legal hold

A

D. Legal hold

Explanation:
Legal hols require organizations and individuals to retain data relevant to a course case. Organizations cannot follow their normal data destruction and lifecycle practices when data is impacted by a legal hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All policies within the organization should include a section that includes all of the following except _____________

A. Policy maintenance
B. Policy monitoring
C. Policy enforcement
D. Policy transference

A

D. Policy transference

Explanation:
All the elements except transference need to be addressed in each policy. Transference is not an element of data retention policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Melissa knows that many data destruction options are not available for data kept in the cloud due to how the services are architected using shared hardware and services. Which of the following is the best option for her organization to select for cloud hosted data that must be disposed of in a secure manner?

A. Melting
B. Cryptoshredding
C. Zeroization
D. Overwriting

A

B. Cryptoshredding

Explanation:
Most cloud services dont provide physical ownership, control or even access to the hardware devices holding the data, so physical destruction, including melting, is not an option. Overwriting and zeroization rely on access to a physical disk or space containing the data will be overwritten, which cannot be guaranteed in a cloud hosted, shared and virtualized environment. Cryptoshredding is the only alternative in most cases when operating in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not a common data right controlled by an IRM system?

A. Copyright
B. Creating
C. Editing
D. Viewing

A

A. Copyright

Explanation:
Copyrights are protected tangible expressions of creative works. IRM rights management focuses on abilities like creating, editing, copying, viewing, printing, forwarding and similar capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Jason wants to properly describe the type of data his organization is using. He knows that the data is stored in a MySQL database.
What type of data is Jasons organization storing?

A. Unstructured data
B. Tabular data
C. Structured data
D. Warehoused data

A

C. Structured data

Explanation:
Traditional databases like MySQL are used to contain structured data. Unstructured data isnt stored in a defined format. Tabular data and warehouse data are not terms used for CCSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sensitivity, jurisdiction and criticality might all be considered for what cloud data security activity?

A. Cryptoshredding
B. Data flow diagramming
C. Classification
D. Tokenization

A

D. Tokenization

Explanation:
Data classification activities often use sensitivity, jurisdiction and criticality as inputs to determine the classification level of data for an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Angela wants to provider users with access rights to files based on their roles. What capability of an IRM system most directly supports this requirement?

A. Provisioning
B. DRM
C. CRM
D. Data labeling

A

A. Provisioning

Explanation:
IRM provisioning capabilities are designed to provider users with rights based on their roles or other criteria. Data labeling is used to determine which data should be handled based on IRM rules but does not match roles to rights. DRM is digital rights management and is the technical implementation of controls - it does not match rights to files based on a role. Finally, CRM is the acronym for customer relationship management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Nina’s company has stored unstructured data in an S3 bucket in AWS. She wants to perform data discovery on the data, but the discovery tool that she has requires the data to be local. What concern should Nina express about retrieving large volumes of data from a cloud service?

A. Performance may be low
B. Data ingress costs may be high
C. Data egress costs may be high
D. The data will need to be structured before discovery can run

A

C. Data egress costs may be high

Explanation:
Moving large volumes of data from a c loud service can result in high egress fees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tej wants to conduct data discovery across his organizations databases; however, he knows that data is stored in multiple countries. What concern should he raise before the discovery process is conducted?

A. Structured data is harder to conduct discovery on
B. The discovery process may create a denial or service condition to the database servers
C. Jurisdiction and local laws may impact the ability to perform discovery
D. Unstructured data is harder to conduct discovery on

A

C. Jurisdiction and local laws may impact the ability to perform discovery

Explanation:
Jurisdiction and local law may create concerns for data discovery. Some data may require specific handling and needs to be accounted for before discovery and related actions are taken. Structured data is typically easier to conduct discovery against due to its well understood nature

16
Q

Naomi has implemented a data arching process as part of her organizations cloud design. What important part of her archiving plan should she prioritize to ensure its long term success?

A. Data classification
B. Periodic Testing
C. Data Mapping
D. Hashing

A

B. Periodic Testing

Explanation:
Periodically testing data archiving, backup and recovery capabilities is a key part of ensuring that they are successful in the long term. Classification and data mapping are useful to determine what should be archived and when it should be destroyed or discarded but are not critical to the success of the archiving process itself

17
Q

Yasmine’s organization wants to enable systems to use data controlled by an IRM. What method is most commonly used to identify systems while allowing them to have their trust revoked if needed?

A. LEAP Authentication
B. MFA
C. Certificate based authentication and authorization
D. TACAS

A

C. Certificate based authentication and authorization

Explanation:
Certs are commonly used to allow systems to authenticate and receive authorization to access data through an IRM system. MFA typically requires an event and human interaction, making it less useful for systems based accesses. Neither TACAS nor LEAP is used for this purpose

17
Q

Meena is conducting data discovery with data encoded in JSON. What type of data is she working with?

A. Structured
B. Semi structured
C. Super structured
D. Unstructured

A

B. Semi structured

Explanation:
JSON is an example of semi structured data.

18
Q

Isaac wants to describe common information rights management (IRM) functions to his team. Which of the following is not a common IRM function?

A. Persistency
B. Cryptoshredding
C. Automatic Expiration
D. Dynamic Policy Control

A

B. Cryptoshredding

Explanation:
IRM tools should include all the functions listed except for cryptoshredding, which is typically associated with lifecycle management rather than rights management

19
Q
A