Chapter 3 - Data Classification Flashcards
All of these are methods of data discovery, except:
A. Content-based
B User-based
C. Label-based
D. Metadata-based
B. All the others are valid methods of data discovery; user-based is a red herring with no meaning.
Data labels could include all of the followings, except:
A. Date data was created
B. Data owner
C. Data value
D. Data of scheduled destruction
C. All the other might be included in data labels, but we don’t usually include data value, since it is prone to change frequently, and because it might not be information we want to disclose to anyone who does not have need to know.
Data labels could include all of the following, except:
A. Source
B. Delivery vendor
C. Handling restrictions
D. Jurisdiction
B. All the others might be included in data labels, but we don’t include delivery vendor, which is nonsense in context.
Data labels could include all of the following, except:
A. Confidentiality level
B. Distribution limitations
C. Access restrictions
D. Multifactor authentication
D. All the others might be included in data labels, but multifactor authentication is a procedure used for access control, not a label.
All of the following are data analytics modes, except:
A. Real-time analytics
B. Datamining
C,. Agile business intelligence
D. Refractory iterations
D. All of the others are data analytics methods, but “refractory iterations” is a nonsense term thrown in as a red herring.
In the cloud motif, the data owner is usually:
A. In another jurisdiction
B. The cloud customer
C. The cloud provider
D. The cloud access security broker
B. The data owner is usually considered the cloud customer in a cloud configuration; the data in question is the customer’s information, being processed in the cloud. The cloud provider is only leasing services and hardware to the customer. The cloud access security broker (CASB) only handles access control on behalf of the cloud customer, and is not in direct contact with the production data.
In the cloud motif, the data process is usually:
A. The party that assigns access rights
B. The cloud customer
C. The cloud provider
D., The cloud access security broker
C. In legal terms, when “data processor” is defined, it refers to anyone who stores, handles, moves, or manipulates data on behalf of the data owner or controller. In the cloud computing realm, this is the cloud provider.
Every security program and process should have which of the following?
A. Foundational policy
B. Sever penalties
C. Multi-factor authentication
D. Homomorphic encryption
A. Policy drives all programs and functions in the organization; the organization should not conduct any operations that don’t have a policy governing them. Penalties may or may not be an element of policy, and the severity depends on the topic. Multifactor authentication and homomorphic encryption are red herrings here.
All policies within the organization should include a section that includes all of the following, except:
A. Policy maintenance
B, Policy review
C. Policy enforcement
D. Policy adjudication
D. All of the elements except adjudication need to be addressed in each policy. Adjudication is not an element of policy.
The most pragmatic option for data disposal in the cloud is which of the following?
A. Melting
B. Cryptoshredding
C. Cold fusion
D, Overwriting
B. We don’t have physical ownership, control, or even access to the devices holding the data, so physical destruction, including melting, is not an option. Overwriting is a possibility, but it is complicated by the difficulty of locating all the sectors and storage areas that might have contained our data, and by the likelihood that constant backups in the cloud increase the change we’ll miss somethings as it’s being overwritten. Cryptoshredding is the only reasonable alternative. Cold fusion is a red herring.
What is the intellectual property protection for the tangible expression of a creative idea?
A. Copyright
B. Patent
C. Trademark
D. Trade secret
A. Copyrights are protected tangible expressions of creative works. The other answers listed are answers to subsequent questions.
What is the intellectual property protection for a useful manufacturing innovation?
A. Copyright
B. Patent
C. Trademark
D. Trade secret
B. Patents protect processes (as well as inventions, new plantlike, and decorative patterns).
What is the intellectual property protection for a very valuable set of sales leads?
A. Copyright
B. Patent
C. Trademark
D. Trade secret
D. Confidential sales and marketing materials unique to the organization are trade secrets.
What is the intellectual protection property for a confidential receipt for muffins?
A. Copyright
B. Patent
C. Trademark
D. Trade secret
D., Confidential recipes unique to the organization are trade secrets.
What is the intellectual property protection for the logo of a new video game?
A. Copyright
B. Patent
C. Trademark
D. Trade secret
C. Logos and symbols and phrases and color schemes that describe brands are trademarks.