Domain 2 Test Notes Flashcards

(35 cards)

1
Q

Exceptional Grave Damage

A

Top Secret (Government)
Confidential (Non-Government)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Serious Damage

A

Secret (Government)
Private (Non-Government)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Damage

A

Confidential (Government)
Sensitive (Non-Government)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

No Damage

A

Unclassified (Government)
Public (Non- Government)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is memory that the system can read but can’t change (nonvolatile). The contents of it are burned in at the factory and can’t be altered. Common use is BIOS.

A

Read Only Memory (ROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The contents isn’t burned in at the factory., instead it has a special functionality that allows an end user to burn in the chip’s contents later. Once data is written, no further changes are possible.

A

Programmable Read Only Memory (PROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can be erased with special ultraviolet light after which user can burn new information into it.

A

Ultraviolet Erasable Programmable Read Only Memory (UVEPROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Electric voltages are delivered to the pins of the chip to force erasure.

A

Electronically Erasable Programmable Read Only Memory (EEPROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nonvolatile form of storage media where it can be erased and written in blocks or pages. Examples Memory cards, thumb drives

A

Flash Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Readable and writable memory that contains information a computer uses during processing. It retains it contents only when power is continuously supplied to it.

A

Random Access Memory (RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of RAM that uses latches (flip-flop) to store bits. It is fast and expensive, but has low capacity. Example: CPU cache memory

A

Static Random Access Memory (SRAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of RAM that use small capacitors to store bits. Must be refreshed regularly. It is slower and cheaper with a higher capacity.

A

Dynamic Random Access Memory (DRAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

prevents data from being discovered or accessed by a subject by positioning the data in a logical storage compartment that is not accessible or seen by the subject.

A

Data Hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Performing a delete operation against a file, files, or media. Simply
deleting a file doesn’t actually remove the data from the storage device. The space the file occupied is marked as “free” and can be overwritten by new data, but until that happens, the data might still be recoverable using forensic tools.

A

Erasing (deleting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Preparing media for reuse and ensuring data cannot be recovered
using traditional recovery tools. Overwriting the storage media with a single pattern (e.g., zeros) can make it more difficult to recover data using simple techniques. However, sophisticated forensic methods might still be able to recover fragments of the original
data.

A

Clearing (overwritting)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is a more intense form of clearing, often involving multiple overwrite
passes. While it offers better protection than a single overwrite, it’s not guaranteed to be completely secure against advanced forensic techniques.

17
Q

creates a strong magnetic field that erases data on some media. Commonly used to remove data from magnetic tapes with the goal of returning the tape to its original state. No Affect option for CDs, DVDs, or SSDs

18
Q

The most secure method of sanitizing media. Ensure that the media can’t be reused or repaired and the data can’t be extracted.

19
Q

software placed logically between the uses and the cloud based resources. It can be on premises or within the cloud. Anyone who accesses the cloud goes through it. It monitors all activity and enforces administrator-defined security policies.

A

Cloud Access Security Broker (CASB)

20
Q

is a set of access control technologies used to restrict the use, modification, and distribution of copyrighted works such as software, multimedia content, and documents. It focuses on protecting intellectual property and controls access, copying, and distribution of digital
content. It is often used for media files, e-books, and software licensing.

A

Digital Rights Management (DRM)

21
Q

refers to a set of tools and processes designed to detect and prevent breaches, exfiltration, or unwanted destruction of sensitive data. It monitors, detects, and blocks sensitive data in use, in motion, and at rest.

A

Data Loss Prevention (DLP)

22
Q
  1. Collect/Create
  2. Store
  3. Use
  4. Share
  5. Retain
  6. Destroy
A

Data Lifecycle

23
Q

The individual or entity with ultimate authority and decision-making power
over the data. They determine how the data is used, protected, and disposed of. Accountable for data security, meaning they bear the ultimate responsibility for data security.

24
Q

The organization or individual who determines the purposes and means
of data processing. They are responsible for ensuring compliance with relevant regulations and implementing appropriate security controls. The data owner often delegates responsibility to the Controller for ensuring security and compliance.

A

Data Controller

25
The entity entrusted with physically storing and managing the data on a day-to-day basis. They are responsible for data availability, integrity, and access controls. (Responsibilities: Carries out the tasks as directed by owner/controller)
Data Custodian
26
An organization or individual that processes data on behalf of the data controller. They must comply with the controller’s instructions and implement appropriate security safeguards. (Responsibilities: Carries out specific processing tasks)
Data Processor
27
Individuals who are authorized to access and use the data. They are responsible for following security policies and procedures to protect the data. (Responsibilities: Uses the data according to permissions)
User/Subject
28
The process of removing all relevant data so that it is impossible to identify the original subject or person. You should only use this technique if you do not need to identify the original subject
Anonymization
29
The process of using pseudonyms (aliases) to represent other data. It removes the privacy data so the remaining data can be shared, while sensitive data remains available in a separate dataset.
Pseudonymization
30
A data security technique that replaces sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security. It is commonly used for protecting sensitive data like credit card numbers, social security numbers, etc.
Tokenization
31
An obfuscation technique where only partial data is visible in a data field. For example, a credit card may be shown as **** **** **** 1234. This technique is commonly implemented within the database tier, but also possible in code of frontend applications.
Data masking
32
Modifying the list of security controls within a baseline to align with the organization's mission. In other words, customizing a standard to your organization
Tailoring
33
Reviewing a list of baseline security controls and selecting only those controls that apply to the IT system you're trying to protect.
Scoping
34
Focuses on ensuring that only authorized subjects (users or processes) can access specific memory locations (objects) and perform permitted operations on them.
Memory Access Control
35
a system that tracks the location of assets or people in real-time, typically using tags or transponders attached to the tracked items and receivers strategically placed to detect the signals.
Real Time Location System