19-C Flashcards

1
Q

What is the consequence of breaching confidential data?

A

Almost impossible to recover and re-secure

Breaches can lead to significant reputational damage and legal implications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is regulated data?

A

Information that must be collected, processed, and stored in compliance with federal and/or state legislation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define a data breach.

A

When confidential or regulated data is read, copied, modified, or deleted without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is personally identifiable information (PII)?

A

Data that can be used to identify, contact, or locate an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give examples of PII.

A
  • Name
  • Date of birth
  • Email address
  • Street address
  • Biometric data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of personal government-issued information?

A
  • Social security number (SSN)
  • Passport
  • Driving license
  • Birth/marriage certificates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does healthcare data include?

A

Medical and insurance records plus associated hospital and laboratory test results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the PCI DSS?

A

Payment Card Industry Data Security Standard governing processing of credit card transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a key aspect of data handling best practices?

A

Training employees to identify PII and handle sensitive data appropriately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are data retention requirements?

A

Regulations that may set maximum or minimum periods for the retention of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What constitutes prohibited content?

A

Any information not applicable to work, including obscene or illegally copied content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an end-user license agreement (EULA)?

A

A license governing the use of software, often restricting installation to one computer or user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a personal license in software terms?

A

Allows the product to be used by a single person at a time, potentially on multiple devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of a Computer Security Incident Response Team (CSIRT)?

A

To provide a single point-of-contact for reporting security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: Involving law enforcement in an incident investigation is always under the organization’s control.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is digital forensics?

A

The science of collecting evidence from computer systems to be accepted in a court of law

17
Q

What does a chain of custody form record?

A

Where, when, and who collected the evidence, who handled it subsequently, and where it was stored

18
Q

What is data destruction and disposal?

A

Destroying or decommissioning data storage media, such as hard disks and flash drives

19
Q

Fill in the blank: Data from a file ‘deleted’ from a disk is not ______.

20
Q

What should be done before repurposing or recycling media devices?

A

Sanitize data remnants on the media

21
Q

What is the importance of monitoring software licenses?

A

To ensure compliance with licensing agreements and avoid legal issues

22
Q

What happens to data when a file is deleted from a disk?

A

The HDD sector or SSD block is marked as available for writing; the information remains until new data is written over it.

23
Q

True or False: Using the OS standard formatting tool completely erases all data from a disk.

A

False

The formatting tool only removes references to files and marks sectors as usable.

24
Q

What is the purpose of disk erasing/wiping software?

A

To ensure that old data is destroyed by writing to each location on a hard disk drive.

25
What is a low-level format?
A process to reset a disk to its factory condition, often incorporating a sanitize function.
26
What does Secure Erase (SE) do?
Performs zero-filling on HDDs and marks all blocks as empty on SSDs.
27
What is Instant Secure Erase (ISE)/Crypto Erase?
A method that destroys the media encryption key of self-encrypting drives, rendering encrypted data unrecoverable.
28
Fill in the blank: If a device firmware does not support encryption, using a software disk-encryption product and then destroying the key and using _______ should be sufficient for most confidentiality requirements.
Secure Erase (SE)
29
What are three methods of physical destruction for media devices?
* Shredding * Incinerating * Degaussing
30
What is the risk associated with degaussing?
It does not work with SSDs or optical media.
31
What should a third-party vendor provide after secure disposal?
A certificate of destruction showing the make, model, and serial number of each drive handled.
32
What is a potential risk when using drill or hammer hand tools for disk destruction?
There is a risk of leaving fragments that could be analyzed using specialist tools.
33
What is an example of regulated data in healthcare?
Patient records, medical history, billing information.
34
Is it valid for an employee to use a private license for a graphics editing application temporarily at work?
No, unless the license permits such use.
35
Why are the actions of a first responder critical in forensic investigations?
They help preserve evidence and maintain the integrity of the investigation.
36
What does chain-of-custody documentation prove?
It proves the integrity and handling of evidence throughout the investigation process.
37
What factors must be considered before using a Windows boot disk to delete partition information from workstations?
The effectiveness of the method on HDDs and SSDs, potential data recovery risks, and compliance with data handling policies.