Data Protection Concepts and Strategies Flashcards

1
Q

What is the most stringent privacy and security law in the world drafted and passed by the European Union (EU)?
A. GLBA
B. PCI_DSS
C. HITECH
D. GDPR

A

D. GDPR
The General Data Protection Regulation (GDPR) is considered one of the most stringent data protection laws globally. It imposes strict rules on how organizations can collect, process, and store personal data of EU citizens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of corporate data classification applies to information limited to employees only and often has different security requirements that affect who can access it and how it can be used?
A. Public
B. Internal
C. Top secret
D. Confidential

A

B. Internal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a process of dividing and organizing data and information into defined groups to enable handling, labeling, sorting, viewing, and securing?
A. Segmentation
B. Encryption
C. Tokenization
D. Compartmentalization

A

A. Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In which data lifecycle is data typically placed onto a volume (block), object (blob), file system, or into one of several types of databases?
A. Use
B. Share
C. Create
D. Store

A

D. Store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of data is temporarily in computer memory or Redis cache waiting to be read or updated?
A. Data in storage
B. Data at rest
C. Data in transit
D. Data in use

A

D. Data in use
Data in use refers to data that is currently being processed, accessed, or modified by a system. This includes data that is temporarily stored in computer memory (RAM) or in a cache like Redis, waiting to be read or updated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which data obfuscation technique involves sending sensitive data through an API call (or batch file) to a system that replaces the data with non-sensitive, pseudorandom placeholders?
A. Encryption
B. Tokenization
C. Obscuring
D. Data mapping

A

B. Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is any representation of data that allows the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means?
A. Intellectual property
B. Regulated data
C. Personally identifiable information
D. Personal health information

A

C. Personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which algorithm is most commonly used to protect data at rest?
A. TLS
B. DHKE
C. AES
D. 3DES

A

C, AES
AES (Advanced Encryption Standard) is the most commonly used algorithm to protect data at rest. It is a symmetric-key encryption algorithm that is widely considered to be secure and efficient. AES is used by many organizations, including governments, to protect sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly