Asset Security Flashcards

1
Q

What is the purpose of a classification system?

A

To ensure information is marked in a way that only those that need access can see the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Once data has been classified it retains that classification for its entire existence and a review is not necessary - True or False?

A

False. A periodic review should be done to recertify the classification is still appropriate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is responsible for classifying the data?

A

The Data Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the acronym ITAM stand for?

A

IT Asset Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What two things should you consider when classifying information and supporting assets?

A

Sensitivity and Criticality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between data ownership and data custodianship?

A

Data ownership is the accountability and responsibility for the systems around the management of data. Custodianship is the implementation of those controls and the management of data within those systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At a high-level, information has a life that consists of _________, ____ and __________.

A

Creation, Use and Destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define “Data Remanence”?

A

Data remanence is the residual physical representation of data that has been in some way erased.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the context of a data security control, what is the objective of a baseline?

A

The objective of a baseline protection is to establish a minimum set of safeguards to protect all or some of the IT systems in the organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the US DoD 5220.22-M standard define when disk wiping?

A

The US DoD 5220.22-M method requires overwriting all addressable storage and indexing locations on the drive three times: with zeros (0x00), complement (0xFF) and random characters; and then verifies all writing procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name three methods of secure destruction?

A
  • Wiping
  • Degaussing
  • Shredding
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Anytown Hospital Gift Shop POS system was the target of a successful cybercrime attack. The POS system stored product SKUs, postcodes and transaction amounts. Is this information legally protected?

a. No, SKUs, postcodes and transaction amounts are not legally protected.
b. Yes, postcodes and transactions are classified as NPPI.
c. Maybe, it depends upon the number of records.
d. Yes, patient information is legally protected underr HIPAA.

A

Answer: a

No, SKUs, postcodes and transaction amounts are not legally protected.

Don’t be tempted by d because it’s a hospital, and c because PCI does look at the number of records. FOCUS only on the information that has been provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the acronym COPPA stand for?

A

Children’s Online Privacy Protection Rule (US)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following statements best defines the concept of privacy?

a. The right of an individual to opt out of data use and collection.
b. The right of an individual to conduct their daily lives unnoticed.
c. The right of an individual to be compensated for the use of their personal information.
d. The right of an individual to control the use of their personal information.

A

Answer: d

The right of an individual to control the use of their personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Select the terms to correctly complete the sentences below.

a. __________ applies to the privacy and security of financial records.
b. __________ applies to the privacy and security of medical records.
c. __________ applies to the security of payment card data.
d. __________ requires parental consent for data collection.
e. __________ applies to the privacy of educational records.
f. __________ is based on the OECD principles.

  • PCI DSS
  • GLBA
  • Data Protection Directive
  • COPPA
  • HIPAA
  • FERPA
A

a. GLBA applies to the privacy and security of financial records.
b. HIPAA applies to the privacy and security of medical records.
c. PCI applies to the security of payment card data.
d. COPPA requires parental consent for data collection.
e. FERPA applies to the privacy of educational records.
f. Data Protection Directive is based on the OECD principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following best describes the difference between archiving and backup?

a. Archiving is discretionary; back is mandatory.
b. Archiving must comply with Federal Rules of Civil Procedure.
c. Archiving has a retention period; backups do not.
d. Archiving objective is retention; backup objective is recovery.

A

Answer: d

Archiving objective is retention; backup objective is recovery.

17
Q

When a file is deleted, which of the following is not true?

a. The MFT table documents the area as available.
b. The OS marks the drive three times with zeros (0x00).
c. The corresponding file pointer in the MFT is removed.
d. The original data remains intact until overwritten.

A

Answer: b

The OS marks the drive three times with zeros (0x00).

18
Q

The US DoD 5220.22-M specification pertains to what destruction method?

a. Disk shredding
b. DIsk wiping
c. Disk deletion
d. Disk degaussing

A

Answer: b

Disk wiping

19
Q

The European Union data protection legislation is closely tied to which principle?

a. Zachman Ontology
b. OECD Privacy Principles
c. NIST Cybersecurity Framework
d. ISO 27000 ISMS

A

Answer: b

OECD Privacy Principles

Zachman Ontology is a framework that has nothing to do with privacy. NIST Cybersecurity Framework is all about controls and maturity. ISO 27000 is a management system which has more to do with certification.

20
Q

What is meant by dwell time in keystroke dynamics?

A

The amount of time you hold down a specific key.

21
Q

What does the acronym DSV denote?

A

Digital Signature Verification

22
Q

What is Flask?

A

A flexible operating system security architecture.

23
Q

Which authentication factor type is a smart card?

A

A Type 2 authentication factor, or something you have.