Chapter 7 - Confidentiality and Privacy Flashcards

1
Q

What three things should you see when reviewing the efficiency of a training and education program on confidentiality and privacy?

A
  1. Have a document policy that aligns with current procedures
  2. Conduct regular training sessions
    3.maintains records to track employee participation and compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a common attack against hashes? Define it

A

Collision attack - allows bad actors to create different inputs that result in the same hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SSH

A
  1. Called secure shell
  2. method for secure remote communications from one computer to another.
  3. Provides strong authentication and secure channel over internet or unsecured networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transport Layer Security

  1. What does it protect
  2. What does it authenticate
A

protect the confidentiality and integrity of data in transit.

Authenticates web server or both then server and client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A digital envelope uses what type of encryption?

A

Asymmetric and symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Performing regular audits and checking system logs are examples of what?

A

Reactive measures

  • detect ongoing crimes and crimes that have already been committed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital signatures use what?

A

Hashing and asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What helps the autior understand how a carved out org communicates to subcompany in Soc 2

A

Orgs contractual agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What governance process involves creating usage policies based on sensitive data classifications?

A

Data loss prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What would you do to compare the process with the documented policy?

A

Walkthrough

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Principle compares your company to other companies in the same industry?

A

Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you monitor data usage through automated and manual activities as part of a data loss prevention program?

A

Data Access logs

-Logs provide an audit trail showing the date, time, and user who created, read, updated, or deleted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who selects members of the incident handling and incident response teams?

A

Senior Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What encryption uses AES
-Generate keys of 128, 192,258
-uses the same key for encryption and decryption

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What encrpytion uses RSA
- Generate keys of 2048, 3072, 4096
-Uses a public key for encryption and a private key for decryption
-used for digital signatures

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What method is most effect for encrypting data on mobile devices?

A

Elliptic curve cryptography

Requires shorter keys and limited bandwidth resources

17
Q

What do you use to encrypt data before transmission, especially when accessed remotely?

A

Cryptographic keys