Chapter 5 Protecting Security of Assets Flashcards

1
Q

“applied to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security that the original classification authority is able to identify or describe.”

Top Secret
Secret
Confidential
Unclassified

A

Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

available to anyone, though it often requires individuals to request the information using procedures identified in the Freedom of Information Act (FOIA).

Top Secret
Secret
Confidential
Unclassified

A

Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

“applied to information, the unauthorized t disclosure of
which reasonably could be expected to cause exceptionally grave damage to the national security that the original classification authority is able to identify or describe.”

Top Secret
Secret
Confidential
Unclassified

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

“applied to information, the unauthorized disclosure
of which reasonably could be expected to cause damage to the national security that the original classification authority is able to identify or describe.”

Top Secret
Secret
Confidential
Unclassified

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

information posted in websites, brochures, or any other public source.

Confidential or Proprietary
Private
Sensitive
Public

A

Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a data breach would cause serious damage to the mission of the organization.

Confidential or Proprietary
Private
Sensitive
Public

A

Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a data breach would cause exceptionally grave damage
to the mission of the organization.

Confidential or Proprietary
Private
Sensitive
Public

A

Confidential or Proprietary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a data breach
would cause damage to the mission of the organization.

Confidential or Proprietary
Private
Sensitive
Public

A

Sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________ is the data that remains on a hard drive as residual magnetic flux.

A

Data remanence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What realigns the magnetic fields in magnetic media such as traditional hard drives, magnetic tape, and floppy disk drives.

A

Degausser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

any process that purges media or a system in
preparation for reuse in an unclassified environment

Erasing
Clearing
Purging
Declassification
Sanitization
Degaussing
A

Declassification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

combination of processes that removes data from a system or from media. It ensures that data cannot be recovered by any means.

Erasing
Clearing
Purging
Declassification
Sanitization
Degaussing
A

Sanitization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

creates a strong magnetic field that erases data on some media and used to remove data
from magnetic tapes

Erasing
Clearing
Purging
Declassification
Sanitization
Degaussing
A

Degaussing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

writes a single character over the entire media, writes the character’s complement over the entire media, and finishes by writing random bits over the entire media. It repeats this in three separate passes,

Erasing
Clearing
Purging
Declassification
Sanitization
Degaussing
A

Clearing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

clearing that prepares media for reuse in less secure environments. Repeats the clearing process multiple
times and may combine it with another method

Erasing
Clearing
Purging
Declassification
Sanitization
Degaussing
A

Purging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It can use key sizes of 32 bits to 448 bits and is a strong encryption protocol.

Advanced Encryption Standard
Triple DES
Blowfish

A

Blowfish

17
Q

NIST selected it as a standard replacement
for the older Data Encryption Standard (DES) in 2001

Advanced Encryption Standard
Triple DES
Blowfish

A

Advanced Encryption Standard

18
Q

The fi rst implementation used 56-bit keys but newer implementations use 112-bit or 168-bit
keys.

Advanced Encryption Standard
Triple DES
Blowfish

A

Triple DES

19
Q

Almost all HTTPS transmissions use ____ as the underlying encryption protocol

A

Transport Layer Security (TLS)

20
Q

L2TP/IPsec encrypts data and sends it over the Internet using _________
mode to protect it while in transit.

A

Tunnel

21
Q

_____ assign permissions based on the principles of least privilege and the need to know, granting users access to only what they need for their job.

Data Owners
System Owners
Business/Mission Owners
Data Processors
Administrators
Custodians
A

Administrators

22
Q

______ helps protect the
integrity and security of data by ensuring it is properly stored and protected.

Data Owners
System Owners
Business/Mission Owners
Data Processors
Administrators
Custodians
A

Custodians

23
Q

“a natural or legal person which processes personal data solely on behalf of the data controller.”

Data Owners
Data Processors
Business/Mission Owners
Data Processors
Administrators
Custodians
A

Data Processors

24
Q

They also ensure it has adequate security controls based on the classification and the organization’s security policy
requirements.

Data Owners
System Owners
Business/Mission Owners
Data Processors
Administrators
Custodians
A

Data Owners

25
Q

Maintains the system security plan and ensures that the system is deployed and operated according to the agreed-upon security requirements

Data Owners
System Owners
Business/Mission Owners
Data Processors
Administrators
Custodians
A

System Owners

26
Q

The US Department of Commerce runs the ______
program, which is a regulatory mechanism that includes a set of Safe Harbor
Principles.

A

Safe Harbor

27
Q
Degaussing does not affect optical \_\_\_\_\_
CDs
DVDs
hard disks
magnetic tapes
SSDs.
A

CDs, DVDs, or SSDs.

28
Q

_______ is a delete operation against a file, a selection of files, or the entire media.

Erasing
Clearing
Purging
Declassification
Sanitization
Degaussing
A

Erasing

29
Q

__________ is a process of preparing media for reuse and assuring that the cleared data cannot be recovered using traditional recovery tools.

Erasing
Clearing
Purging
Declassification
Sanitization
Degaussing
A

Clearing

30
Q

IPsec is often combined with ______ for VPNs.

A

Layer 2 Tunneling Protocol (L2TP)

31
Q

________ identify the classification of data and ensure that it is labeled properly.

Data Owners
System Owners
Business/Mission Owners
Data Processors
Administrators
Custodians
A

Data Owners

32
Q

Establishes the rules for appropriate use and protection of the subject
data/information (rules of behavior)

Provides input to information system owners regarding the security requirements
and security controls for the information system(s) where the information resides

Decides who has access to the information system and with what types of privileges
or access rights

Data Owners
System Owners
Business/Mission Owners
Data Processors
Administrators
Custodians
A

Data Owners

33
Q

Develops a system security plan in coordination with information owners, the system administrator, and functional end users

Maintains the system security plan and ensures that the system is deployed and
operated according to the agreed-upon security requirements

Ensures that system users and support personnel receive appropriate security
training, such as instruction on rules of behavior (or an AUP)

Updates the system security plan whenever a significant change occurs
Assists in the identification, implementation, and assessment of the common security controls.

Data Owners
System Owners
Business/Mission Owners
Data Processors
Administrators
Custodians
A

System Owners