Chapter 3 Flashcards

1
Q

Three analysis methods used with data discovery techniques

A

Metadata, labels, and content analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Features of IRM

A
  • Sets up a baseline for the default Information Protection Policy
  • Adds an extra layer of access controls on top of the data object or document
  • Protects sensitive organization content
  • Contains ACLs and is embedded into the original file, therefore IRM is agnostic to the location of the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which process analyze data to look for certain attributes or patterns

A

Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Four elements that a data retention policy should define

A
  • Retention Periods
  • Data Formats
  • Data Security
  • Data Retrieval procedures for the enterprise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

APIS can be broken into multiple formats, which include

A

REST: A software architecture style consisting of guidelines and best practices for creating scalable web services

SOAP: A protocol specification for exchanging structured information in the implementation of web services in computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Principles used in the performance of Trust Services Engagements

A
  • Processing Integrity
  • Confidentiality
  • Availability
  • Security
  • Privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Common capabilities of IRM solutions

A
  • Persistent protection
  • Dynamic Policy Control
  • Automatic expiration
  • Continuous audit trail
  • Support for existing authentication security infrastructure
  • Mapping for repository ACLs
  • Integration with all third-party email filtering engines
  • Additional security and protection capabilities
  • Support for email applications
  • Support for other document types
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Discovery Issues

A
  • Hidden costs
  • Dashboard
  • Poor data quality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Categories of personal data that can be processed

A
  • Sensitive Data
  • Telephone or Internet Data
  • Biometric Data
  • Personal Data
  • Categories of the processing to be performed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Important Processes of the continuous operation of Audit logging

A
  • Reduction of False positives
  • Adding new rules
  • New event detection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly