Explain Data Handling Best Practices Flashcards

lesson 19C (27 cards)

1
Q
A

Verifying a source disk with an image made using AccessData FTK® Imager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data breaches require

A

strong incident response procedures, as CompTIA A+ technicians play a key role in identifying, reporting, and mitigating security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Regulated data must comply with

A

relevant laws, and any unauthorized access, modification, or deletion—whether accidental or malicious—requires reporting to regulators and affected individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Personally identifiable information (PII)

A

includes data like names, phone numbers, and biometric details that can be used to identify or impersonate individuals, requiring careful handling to prevent identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Personal government-issued information

A

such as Social Security numbers, passports, and driver’s licenses, is classified as personally identifiable information (PII) and is protected under privacy laws like the US Privacy Act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Healthcare data includes

A

medical records, insurance details, and test results, and can be anonymized or de-identified for research, but breaches can cause significant reputational damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Payment Card Industry Data Security Standard (PCI DSS)

A

mandates strict security measures for processing credit card transactions, protecting cardholder data and sensitive authentication information like CV2 and PINs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Employees must be trained to handle

A

personally identifiable information (PII) securely, avoiding unauthorized access, copying, or exposure to prevent data leaks and privacy breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Regulated data retention policies may require

A

companies to securely destroy data after a set period or retain it for compliance, ensuring proper logging and verification of destruction when applicable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Organizations must implement strict policies to detect and remove

A

prohibited content and unlicensed software from company workstations, ensuring compliance with security and legal regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prohibited content on employee workstations includes

A

non-work-related data, obscene material, and illegally copied/pirated files, with acceptable use policies restricting internet misuse and personal communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

end-user license agreement (EULA)

A

governs software usage, restricting installation to specified terms, including personal versus commercial use, to prevent licensing violations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Corporate software licenses allow businesses to

A

install applications on multiple workstations legally, while compliance monitoring helps prevent unauthorized use and security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ensuring valid software licenses requires businesses

A

to prevent misuse of personal licenses for corporate use and accurately match corporate licenses to the number of devices or users accessing the software, with inventory and management tools aiding compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Expired software licenses require

A

prompt removal from systems when usage rights lapse or the number of authorized devices/users decreases, making renewal tracking essential for compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Open-source licenses allow

A

free use, modification, and redistribution of software while ensuring access to source code, though specific terms may vary and commercial versions may include additional agreements.

17
Q

Digital Rights Management (DRM)

A

restricts the use of digital music and video files by licensing them to a limited number of devices, but enterprises must monitor for pirated content as DRM protections are often bypassed.

18
Q

Incident response in technical support involves

A

identifying and reporting security threats, such as malware infections, unauthorized data access, phishing attempts, DoS attacks, unlicensed software, and prohibited content on company devices.

19
Q

incident response plan (IRP)

A

defines procedures for handling security threats, with larger organizations relying on a Computer Security Incident Response Team (CSIRT) to manage incidents, while serious cases may require law enforcement involvement.

20
Q

Digital forensics involves

A

collecting latent computer-based evidence that requires specialized tools for interpretation, ensuring its integrity for legal proceedings.

21
Q

data integrity and evidence preservation

A

by documenting the scene, collecting live forensic data, creating forensic disk images, verifying authenticity with cryptographic hashes, and securely storing physical devices.

22
Q

chain of custody

A

form ensures evidence integrity by documenting its collection, handling, storage, and transport from the crime scene to the courtroom, preventing tampering or unauthorized access.

23
Q

Data destruction involves securely

A

Standard deletion methods do not completely erase data, making proper sanitization critical when repurposing or disposing of storage media to prevent unauthorized recovery.

24
Q

Disk erasing/wiping software

A

overwrites all data on a hard drive using zeroes or random patterns, preparing it for reuse, though the process is time-consuming and less effective for SSDs.

25
Low-level formatting tools
reset disks to factory conditions, with **Secure Erase (SE)** marking HDD and SSD blocks as empty, while **Instant Secure Erase (ISE)/Crypto Erase** ensures complete sanitization by destroying encryption keys in self-encrypting drives (SEDs).
26
Physical destruction methods like
**shredding, incinerating, and degaussing** effectively render data irretrievable, while outsourced vendors ensure secure disposal with certificates of destruction or recycling.
27