Chapter 3 - Data Classification Flashcards

1
Q

All of these are methods of data discovery, except:

A. Content-based
B User-based
C. Label-based
D. Metadata-based

A

B. All the others are valid methods of data discovery; user-based is a red herring with no meaning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data labels could include all of the followings, except:

A. Date data was created
B. Data owner
C. Data value
D. Data of scheduled destruction

A

C. All the other might be included in data labels, but we don’t usually include data value, since it is prone to change frequently, and because it might not be information we want to disclose to anyone who does not have need to know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data labels could include all of the following, except:

A. Source
B. Delivery vendor
C. Handling restrictions
D. Jurisdiction

A

B. All the others might be included in data labels, but we don’t include delivery vendor, which is nonsense in context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data labels could include all of the following, except:

A. Confidentiality level
B. Distribution limitations
C. Access restrictions
D. Multifactor authentication

A

D. All the others might be included in data labels, but multifactor authentication is a procedure used for access control, not a label.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

All of the following are data analytics modes, except:

A. Real-time analytics
B. Datamining
C,. Agile business intelligence
D. Refractory iterations

A

D. All of the others are data analytics methods, but “refractory iterations” is a nonsense term thrown in as a red herring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In the cloud motif, the data owner is usually:

A. In another jurisdiction
B. The cloud customer
C. The cloud provider
D. The cloud access security broker

A

B. The data owner is usually considered the cloud customer in a cloud configuration; the data in question is the customer’s information, being processed in the cloud. The cloud provider is only leasing services and hardware to the customer. The cloud access security broker (CASB) only handles access control on behalf of the cloud customer, and is not in direct contact with the production data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the cloud motif, the data process is usually:

A. The party that assigns access rights
B. The cloud customer
C. The cloud provider
D., The cloud access security broker

A

C. In legal terms, when “data processor” is defined, it refers to anyone who stores, handles, moves, or manipulates data on behalf of the data owner or controller. In the cloud computing realm, this is the cloud provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Every security program and process should have which of the following?

A. Foundational policy
B. Sever penalties
C. Multi-factor authentication
D. Homomorphic encryption

A

A. Policy drives all programs and functions in the organization; the organization should not conduct any operations that don’t have a policy governing them. Penalties may or may not be an element of policy, and the severity depends on the topic. Multifactor authentication and homomorphic encryption are red herrings here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All policies within the organization should include a section that includes all of the following, except:

A. Policy maintenance
B, Policy review
C. Policy enforcement
D. Policy adjudication

A

D. All of the elements except adjudication need to be addressed in each policy. Adjudication is not an element of policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The most pragmatic option for data disposal in the cloud is which of the following?

A. Melting
B. Cryptoshredding
C. Cold fusion
D, Overwriting

A

B. We don’t have physical ownership, control, or even access to the devices holding the data, so physical destruction, including melting, is not an option. Overwriting is a possibility, but it is complicated by the difficulty of locating all the sectors and storage areas that might have contained our data, and by the likelihood that constant backups in the cloud increase the change we’ll miss somethings as it’s being overwritten. Cryptoshredding is the only reasonable alternative. Cold fusion is a red herring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the intellectual property protection for the tangible expression of a creative idea?

A. Copyright
B. Patent
C. Trademark
D. Trade secret

A

A. Copyrights are protected tangible expressions of creative works. The other answers listed are answers to subsequent questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the intellectual property protection for a useful manufacturing innovation?

A. Copyright
B. Patent
C. Trademark
D. Trade secret

A

B. Patents protect processes (as well as inventions, new plantlike, and decorative patterns).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the intellectual property protection for a very valuable set of sales leads?

A. Copyright
B. Patent
C. Trademark
D. Trade secret

A

D. Confidential sales and marketing materials unique to the organization are trade secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the intellectual protection property for a confidential receipt for muffins?

A. Copyright
B. Patent
C. Trademark
D. Trade secret

A

D., Confidential recipes unique to the organization are trade secrets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the intellectual property protection for the logo of a new video game?

A. Copyright
B. Patent
C. Trademark
D. Trade secret

A

C. Logos and symbols and phrases and color schemes that describe brands are trademarks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the aspect of the DMCA that has often been abused and places the burden of proof on the accused?

A. Online service provider exemption
B. Decryption program prohibition
C. Takedown notice
D. Puppet plasticity

A

C The DMCA provision for takedown notices allows copyright holders to demand removal of subject content from the web, and puts the burden of proof on whoever posted the material; this function has been abused by grievers and trolls and overzealous content producers. The OSP exemption providers a safe harbor provision for web hosts. The decryption program prohibit makes DeCSS and other similar programs illegal. Puppet plasticity is a nonsense term used for red herring.

17
Q

What is the federal agency that accepts applications for new patents?

A. USDA
B. USPTO
C. OSHA
D. SEC

A

B. The US Patent and Trademark Office accepts, reviews, and approves applications for new patents. The USDA creates and enforces agricultural regulations. OSHA oversees workplace safety regulations. The SEC regulates publicly traded corporations.

18
Q

DRM tools use a variety of methods for enforcement of intellectual property rights. These include all of the following except:

A. Support-based licensing
B. Local agent enforcement
C. Dis switch validity
D., Media-present hacks

A

C. DRM solutions use all these methods except for dis switch validity, which a nonsense term.

19
Q

All of the following regions have at least one country with an overarching, federal privacy law protection personal data of its citizens, except:

A. Persistency
B. Europe
C. South America
D, The United States

A

D. The United States does not have a singe, overarching personal privacy law; instead, the US often protects PII by industry (HIPAA, FERPA, and so forth). All EU member countries adhere to the Data Protection Regulation. Argentina’s Personal Data Protection Act cleaves to the EU Regulation, as does Japan’s Act on the Protection of Personal Information.

20
Q

DRM solutions should generally include all of the following functions, except:

A. Persistency
B. Automatic self-destruct
C. Automatic expiration
D. Dynamic policy control

A

B. DRM tools should include all the functions listed except for self-destruction, which might hut someone.

21
Q

Which exception falls under the “fair use” category of copyright-protected materials?

A. No-commercial repurposing
B. Critique
C. Minor modification
D. Commercial research

A

B. Critique