Data Protection Flashcards
1.4 - Explain the importance of using appropriate cryptographic solutions 3.3 - Compare and contrast concepts and strategies to protect data 4.2 - Explain the security implications of proper hardware, software, and data asset management 4.4 - Explain security alerting and monitoring concepts and tools 5.1 - Summarize elements of effective security governance
Which of the following classification levels is most appropriate for information such as trade secrets or intellectual property?
A. Public
B. Sensitive
C. Confidential
D. Critical
Answer: C. Confidential
Explanation: Correct: Confidential classification includes sensitive data like trade secrets, intellectual property, and source code that could harm the business if disclosed. Incorrect Options:
A: Public data has minimal or no impact if disclosed.
B: Sensitive data might cause minimal impact if leaked but is not as critical as confidential information.
D: Critical data holds highly restricted information but is less specific than confidential data.
Which of the following is NOT a commercial business data classification level?
A. Public
B. Sensitive
C. Confidential
D. Top Secret
Answer: D. Top Secret
Explanation: Correct: Top Secret is a classification used by government organizations, not commercial businesses. Incorrect Options:
A: Public data is openly accessible without significant impact.
B: Sensitive data can cause minimal harm if disclosed, e.g., financial data.
C: Confidential data is highly sensitive and requires strict access control.
Which of the following classification levels would most likely apply to an organization’s internal employee records, including salaries?
A. Public
B. Sensitive
C. Private
D. Critical
Answer: C. Private
Explanation: Correct: Private data is internal, such as employee records, that do not need to be disclosed externally. Incorrect Options:
A: Public data is freely available without significant impact.
B: Sensitive data is for information that would cause minimal damage if released.
D: Critical data is the most highly restricted due to its extreme value.
Choose Two) Which of the following types of data could be classified as “Sensitive but Unclassified” in a government organization?
A. Personal medical records
B. Military deployment plans
C. Social Security numbers of citizens
D. Government trade secrets
Answer:
A. Personal medical records
C. Social Security numbers of citizens
Explanation: Correct: Sensitive but Unclassified includes data that could harm individuals but not national security, like medical records and personal identifiers. Incorrect Options:
B: Military deployment plans would fall under Secret or Top Secret.
D: Government trade secrets would be classified as Confidential.
What is one consequence of over-classifying data within an organization?
A. Improved security at a lower cost
B. Unnecessary resource allocation and increased costs
C. Easier access for all personnel
D. Decreased technical protections
Answer:
B. Unnecessary resource allocation and increased costs
Explanation: Correct: Over-classifying data leads to spending excessive time, money, and resources on protection measures. Incorrect Options:
A: Over-classifying leads to higher, not lower, costs.
C: Over-classifying restricts access rather than making it easier.
D: Over-classification actually increases technical protections unnecessarily.
(Choose Three) Which of the following actions should be included in an organization’s data lifecycle policy?
A. Clearly defined data retention period
B. Detailed destruction process once data is no longer needed
C. Public access to all data after one year
D. Compliance with legal and regulatory requirements
E. Continuous monitoring of data throughout its lifecycle
Answer:
A. Clearly defined data retention period
B. Detailed destruction process once data is no longer needed
D. Compliance with legal and regulatory requirements
Explanation: Correct: Data lifecycle policies should define retention periods, include destruction procedures, and comply with legal requirements. Incorrect Options:
C: Public access is not typically part of a controlled data lifecycle unless specified.
E: While monitoring is important, it’s not a direct part of the lifecycle management outlined here.
Which government classification level is most likely to include military deployment plans?
A. Confidential
B. Secret
C. Top Secret
D. Sensitive but Unclassified
Answer:
B. Secret
Explanation: Correct: Secret classification includes military deployment plans and other sensitive information that could damage national security. Incorrect Options:
A: Confidential information is restricted but not as sensitive as Secret.
C: Top Secret data is even more sensitive than Secret and may involve extremely high-value information.
D: Sensitive but Unclassified does not pose a major national security risk.
Which classification level would be used for data such as publicly available course materials or a company’s public website information?
A. Public
B. Sensitive
C. Private
D. Confidential
Answer: A. Public
Explanation: Correct: Public data is openly available and poses no impact on the organization if disclosed. Incorrect Options:
B: Sensitive data has some level of risk if disclosed.
C: Private data is internal and not accessible to the public.
D: Confidential data includes information that could seriously affect the organization if leaked.
Who is responsible for labeling information assets and ensuring they are protected with appropriate controls?
A. Data Controller
B. Data Processor
C. Data Owner
D. Privacy Officer
Answer:
C. Data Owner
Explanation:
Correct: The data owner is a senior executive responsible for labeling information assets and ensuring their protection with appropriate controls.
Incorrect Options:
A: The data controller determines the purposes and methods of data storage and collection.
B: The data processor assists with tasks assigned by the data controller.
D: The privacy officer oversees privacy-related data compliance.
(Choose Two):
Which roles focus on data quality and enforcing access controls?
A. Data Owner
B. Data Custodian
C. Data Controller
D. Data Steward
Answer:
B. Data Custodian
D. Data Steward
Explanation:
Correct:
B: The data custodian enforces access controls, encryption, and backup measures for data.
D: The data steward ensures data quality and appropriate labeling.
Incorrect Options:
A: The data owner focuses on labeling and overall protection controls.
C: The data controller determines data storage, collection, and usage.
Match the following roles to their responsibilities:
Data Processor
Data Custodian
Privacy Officer
A. Responsible for managing systems storing data assets
B. Assists with data collection and processing under the controller’s direction
C. Ensures compliance with privacy regulations
Answer:
1 - B
2 - A
3 - C
Explanation:
Data Processor: Assists the data controller with collection/processing.
Data Custodian: Manages systems for storing and protecting data.
Privacy Officer: Oversees privacy compliance for sensitive data like PII, SPI, and PHI.
(Choose Three):
Which principles are critical for ensuring proper data ownership within an organization?
A. Assigning IT personnel as data owners
B. Selecting knowledgeable department leaders as data owners
C. Maintaining data confidentiality, integrity, and availability
D. Ensuring data minimization and retention policies
Answer:
B. Selecting knowledgeable department leaders as data owners
C. Maintaining data confidentiality, integrity, and availability
D. Ensuring data minimization and retention policies
Explanation:
Correct:
B: Data owners should be department leaders who understand the data’s context.
C: Protecting confidentiality, integrity, and availability is a primary goal.
D: Governance includes data minimization and retention policies.
Incorrect Option:
A: IT personnel are better suited as data custodians, not owners.
What are the responsibilities of a data controller?
A. Ensuring encryption of all data assets
B. Deciding purposes and methods for data storage and usage
C. Assisting with data quality assurance
D. Overseeing access controls and recovery measures
Answer:
B. Deciding purposes and methods for data storage and usage
Explanation:
Correct: The data controller determines data purposes and methods while ensuring legality.
Incorrect Options:
A: This is a responsibility under encryption management, often handled by custodians.
C: Data stewards focus on data quality.
D: Custodians manage access control and recovery.
Which role is responsible for ensuring compliance with regulatory frameworks for sensitive data like PII or PHI?
A. Data Steward
B. Privacy Officer
C. Data Custodian
D. Data Owner
Answer:
B. Privacy Officer
Explanation:
Correct: The privacy officer ensures compliance with regulations concerning sensitive data.
Incorrect Options:
A: Stewards focus on data quality and labeling.
C: Custodians manage the systems where data is stored.
D: Owners focus on overall control and classification.
What is the primary responsibility of a data custodian?
A. Alerting stakeholders of potential breaches
B. Managing systems storing data assets
C. Deciding on data retention policies
D. Labeling and classifying data assets
Answer:
B. Managing systems storing data assets
Explanation:
Correct: The data custodian enforces access controls, manages encryption, and ensures backup measures.
Incorrect Options:
A: Alerting stakeholders falls under monitoring or incident response teams.
C: Retention policies are often set by the privacy officer.
D: Labeling and classification are handled by stewards or owners.
What are the three states of data in the data lifecycle?
A. Data in Motion, Data at Rest, Data in Use
B. Data in Transition, Data in Storage, Data in Access
C. Data in Use, Data in Rest, Data in Progress
D. Data at Rest, Data in Transit, Data in Use
Answer:
D. Data at Rest, Data in Transit, Data in Use
Explanation:
Correct: These are the three recognized states of data: data stored (at rest), moving (in transit), or actively processed (in use).
Incorrect Options:
A: “Data in Motion” is a synonym for “Data in Transit,” but the other terms are incorrect.
B & C: These combinations do not accurately reflect the established states of data.
Which of the following methods can protect data at rest? (Choose Three)
A. Full Disk Encryption (FDE)
B. VPN (Virtual Private Network)
C. Record Encryption
D. Database Encryption
E. SSL/TLS
Answer:
A. Full Disk Encryption (FDE)
C. Record Encryption
D. Database Encryption
Explanation:
Correct:
Full Disk Encryption protects the entire storage medium.
Record Encryption secures specific fields in a database.
Database Encryption secures data at the column, row, or table level.
Incorrect Options:
B: VPN secures data in transit, not at rest.
E: SSL/TLS secures communication over networks (data in transit).
Which encryption method secures the entire storage medium, ensuring all data is encrypted when the system is off?
A. File Encryption
B. Volume Encryption
C. Full Disk Encryption (FDE)
D. Partition Encryption
Answer:
C. Full Disk Encryption (FDE)
Explanation:
Correct: Full Disk Encryption encrypts the entire hard drive, protecting all data when the system is off.
Incorrect Options:
A: File Encryption only encrypts individual files.
B: Volume Encryption applies to selected directories or files.
D: Partition Encryption targets specific partitions, not the whole disk.
Which two methods are commonly used to secure data in transit? (Choose Two)
A. IPSec
B. Database Encryption
C. Secure Sockets Layer (SSL)
D. Record Encryption
Answer:
A. IPSec
C. Secure Sockets Layer (SSL)
Explanation:
Correct:
IPSec secures IP communications through encryption and authentication.
SSL provides secure communication over networks like web browsing and email.
Incorrect Options:
B: Database Encryption secures data at rest.
D: Record Encryption applies to database fields, not data in transit.
Which mechanism encrypts data in memory to prevent unauthorized access during processing?
A. Secure Sockets Layer (SSL)
B. INTEL Software Guard
C. Volume Encryption
D. VPN
Answer:
B. INTEL Software Guard
Explanation:
Correct: INTEL Software Guard encrypts data in memory, safeguarding it from unauthorized processes.
Incorrect Options:
A: SSL secures data in transit, not in use.
C: Volume Encryption applies to stored data, not actively processed data.
D: VPN protects data in transit.