CySA+ Study Notes 9 Flashcards

1
Q

Real Evidence : consists of tangible objects that may be brought into a courtroom.

Order of Volatility : Network Traffic -> Memory Contents -> System and Process Data -> Files -> Logs -> Archived Records.

Live Analysis : retrieves volatile evidence.

Cellebrite is a popular mobile forensic tool.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

??? regulates handling of student educational records.

??? regulates financial institutions.

??? protects privacy of children under 13 years of age.

A

FERPA / GLBA / COPPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Due Care : fulfilling legal responsibilities and professional best practices.

Due diligence : take reasonable measures to investigate security risks.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

??? use human driven processes to manage technology in a secure manner.

??? improve security of the risk management process itself.

??? remediate security issues that have already occurred.

??? implement incident response procedures.

??? use technology to achieve security control objectives.

A

Operational Controls / Managerial Controls / Corrective Controls / Responsive Controls / Technical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COBIT : business focused control framework.

ISO 27001 : part of a series of business standards.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

??? business leaders w/overall responsibility for data they set policies and guidelines for their datasets.

??? handle day-to-day governance activities, they are delegated responsibility by data owners.

??? store and process info and are often IT staff members.

A

Data Owner / Data Steward / Data Custodians

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

??? data is only subject to laws of jurisdictions where its collected, stored or processed; storing data in multiple locations subjects it to multiple jurisdictions.

??? transforms PII into form where its no longer possible to tie to an individual person.

A

Data Sovereignty / Data Obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Tokenization : replaces sensitive fields w/a random identifier.

Masking : replaces sensitive info with blanks or for example X’s.

Pattern Matching : recognizes known patterns of sensitive info, like SSNs.

Watermarking : identifies sensitive info using electronic tags.

A

info …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IRM (Information Rights Management) : enforces data rights, provisions access, implements access control models.

DRM (Digital Rights Management) : provides owners of intellectual property w/technical means to prevent unauthorized use of their content through use of encryption technology.

A

IRM / DRM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

??? external force jeopardizing information and systems.

??? weaknesses in security controls that a threat might exploit to undermine CIA.

??? combo of vuln. and corresponding threat.

A

Threat / Vuln. / Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly