Domain 2 Flashcards
- Angela is an information security architect at a bank and has been assigned to ensure that transactions are secure as they traverse the network. She recommends that all transactions use TLS. What threat is she most likely attempting to stop, and what method is she using to protect against it?
a. Man-in-the-middle, VPN
b. Packet injection, encryption
c. Sniffing, encryption
d. Sniffing, TEMPEST
C. Encryption is often used to protect traffic like bank transactions from sniffing. While packet injection and man-in-the-middle attacks are possible, they are far less likely to occur, and if a VPN were used, it would be used to provide encryption. TEMPEST is a specification for techniques used to prevent spying using electromagnetic emissions and wouldn’t be used to stop attacks at any normal bank.
- COBIT, Control Objectives for Information and Related Technology, is a framework for IT management and governance. Which data management role is most likely to select and apply COBIT to balance the need for security controls against business requirements?
a. Business owners
b. Data processors
c. Data owners
d. Data stewards
A. Business owners have to balance the need to provide value with regulatory, security, and other requirements. This makes the adoption of a common framework like COBIT attractive. Data owners are more likely to ask that those responsible for control selection identify a standard to use. Data processors are required to perform specific actions under regulations like the EU DPD. Finally, in many organizations, data stewards are internal roles that oversee how data is used.
- What term is used to describe a starting point for a minimum security standard?
a. Outline
b. Baseline
c. Policy
d. Configuration guide
B. A baseline is used to ensure a minimum security standard. A policy is the foundation that a standard may point to for authority, and a configuration guide may be built from a baseline to help staff who need to implement it to accomplish their task. An outline is helpful, but outline isn’t the term you’re looking for here.
- When media is labeled based on the classification of the data it contains, what rule is typically applied regarding labels?
a. The data is labeled based on its integrity requirements.
b. The media is labeled based on the highest classification level of the data it contains.
c. The media is labeled with all levels of classification of the data it contains.
d. The media is labeled with the lowest level of classification of the data it contains.
B. Media is typically labeled with the highest classification level of data it contains. This prevents the data from being handled or accessible at a lower classification level. Data integrity requirements may be part of a classification process but don’t independently drive labeling in a classification scheme.
- The need to protect sensitive data drives what administrative process?
a. Information classification
b. Remanence
c. Transmitting data
d. Clearing
A. The need to protect sensitive data drives information classification. This allows organizations to focus on data that needs to be protected rather than spending effort on less important data. Remanence describes data left on media after an attempt is made to remove the data. Transmitting data isn’t a driver for an administrative process to protect sensitive data, and clearing is a technical process for removing data from media.
- How can a data retention policy help to reduce liabilities?
a. By ensuring that unneeded data isn’t retained
b. By ensuring that incriminating data is destroyed
c. By ensuring that data is securely wiped so it cannot be restored for legal discovery
d. By reducing the cost of data storage required by law
A. A data retention policy can help to ensure that outdated data is purged, removing potential additional costs for discovery. Many organizations have aggressive retention policies to both reduce the cost of storage and limit the amount of data that is kept on hand and discoverable.
Data retention policies are not designed to destroy incriminating data, and legal requirements for data retention must still be met.
- Staff in an IT department who are delegated responsibility for day-to-day tasks hold what data role?
a. Business owner
b. User
c. Data processor
d. Custodian
D. Custodians are delegated the role of handling day-to-day tasks by managing and overseeing how data is handled, stored, and protected. Data processors are systems used to process data. Business owners are typically project or system owners who are tasked with making sure systems provide value to their users or customers.
- Susan works for an American company that conducts business with customers in the European Union. What is she likely to have to do if she is responsible for handling PII from those customers?
a. Encrypt the data at all times.
b. Label and classify the data according to HIPAA.
c. Conduct yearly assessments to the EU DPD baseline.
d. Comply with the US-EU Safe Harbor requirements.
D. Safe Harbor compliance helps US companies meet the EU Data Protection Directive. Yearly assessments may be useful, but they aren’t required. HIPAA is a US law that applies specifically to healthcare and related organizations, and encrypting all data all the time is impossible (at least if you want to use the data!).
- Ben has been tasked with identifying security controls for systems covered by his organization’s information classification system. Why might Ben choose to use a security baseline?
a. It applies in all circumstances, allowing consistent security controls.
b. They are approved by industry standards bodies, preventing liability.
c. They provide a good starting point that can be tailored to organizational needs.
d. They ensure that systems are always in a secure state.
C. Security baselines provide a starting point to scope and tailor security controls to your organization’s needs. They aren’t always appropriate to specific organizational needs, they cannot ensure that systems are always in a secure state, nor do they prevent liability.
- What term is used to describe overwriting media to allow for its reuse in an environment operating at the same sensitivity level?
a. Clearing
b. Erasing
c. Purging
d. Sanitization
A. Clearing describes preparing media for reuse. When media is cleared, unclassified data is written over all addressable locations on the media. Once that’s completed, the media can be reused. Erasing is the deletion of files or media. Purging is a more intensive form of clearing for reuse in lower security areas, and sanitization is a series of processes that removes data from a system or media while ensuring that the data is unrecoverable by any means.
- Which of the following classification levels is the US government’s classification label for data that could cause damage but wouldn’t cause serious or grave damage?
a. Top Secret
b. Secret
c. Confidential
d. Classified
C. The US government uses the label Confidential for data that could cause damage if it was disclosed without authorization. Exposure of Top Secret data is considered to potentially cause grave damage, while Secret data could cause serious damage. Classified is not a level in the US government classification scheme.
- What issue is common to spare sectors and bad sectors on hard drives as well as overprovisioned space on modern SSDs?
a. They can be used to hide data.
b. They can only be degaussed.
c. They are not addressable, resulting in data remanence.
d. They may not be cleared, resulting in data remanence.
D. Spare sectors, bad sectors, and space provided for wear leveling on SSDs (overprovisioned space) may all contain data that was written to the space that will not be cleared when the drive is wiped. Most wiping utilities only deal with currently addressable space on the drive. SSDs cannot be degaussed, and wear leveling space cannot be reliably used to hide data. These spaces are still addressable by the drive, although they may not be seen by the operating system.
What term describes data that remains after attempts have been made to remove the data?
a. Residual bytes
b. Data remanence
c. Slack space
d. Zero fill
B. Data remanence is a term used to describe data left after attempts to erase or remove data. Slack space describes unused space in a disk cluster, zero fill is a wiping methodology that replaces all data bits with zeroes, and residual bytes is a made-up term.
For questions 14, 15, and 16, please refer to the following scenario:
Your organization regularly handles three types of data: information that it shares with customers, information that it uses internally to conduct business, and trade secret information that offers the organization significant competitive advantages. Information shared with customers is used and stored on web servers, while both the internal business data and the trade secret information are stored on internal file servers and employee workstations.
- What civilian data classifications best fit this data?
a. Unclassified, confidential, top secret
b. Public, sensitive, private
c. Public, sensitive, proprietary
d. Public, confidential, private
C. Information shared with customers is public, internal business could be sensitive or private, and trade secrets are proprietary. Thus public, sensitive, proprietary matches this most closely. Confidential is a military classification, which removes two of the remaining options, and trade secrets are more damaging to lose than a private classification would allow.
For questions 14, 15, and 16, please refer to the following scenario:
Your organization regularly handles three types of data: information that it shares with customers, information that it uses internally to conduct business, and trade secret information that offers the organization significant competitive advantages. Information shared with customers is used and stored on web servers, while both the internal business data and the trade secret information are stored on internal file servers and employee workstations.
- What technique could you use to mark your trade secret information in case it was released or stolen and you need to identify it?
a. Classification
b. Symmetric encryption
c. Watermarks
d. Metadata
C. A watermark is used to digitally label data and can be used to indicate ownership. Encryption would have prevented the data from being accessed if it was lost, while classification is part of the set of security practices that can help make sure the right controls are in place. Finally, metadata is used to label data and might help a data loss prevention system flag it before it leaves your organization.
For questions 14, 15, and 16, please refer to the following scenario:
Your organization regularly handles three types of data: information that it shares with customers, information that it uses internally to conduct business, and trade secret information that offers the organization significant competitive advantages. Information shared with customers is used and stored on web servers, while both the internal business data and the trade secret information are stored on internal file servers and employee workstations.
16 What type of encryption should you use on the file servers for the proprietary data, and how might you secure the data when it is in motion?
a. TLS at rest and AES in motion
b. AES at rest and TLS in motion
c. VPN at rest and TLS in motion
d. DES at rest and AES in motion
B. AES is a strong modern symmetric encryption algorithm that is appropriate for encrypting data at rest. TLS is frequently used to secure data when it is in transit. A virtual private network is not necessarily an encrypted connection and would be used for data in motion, while DES is an outdated algorithm and should not be used for data that needs strong security.
- What does labeling data allow a DLP system to do?
a. The DLP system can detect labels and apply appropriate protections.
b. The DLP system can adjust labels based on changes in the classification scheme.
c. The DLP system can notify the firewall that traffic should be allowed through.
d. The DLP system can delete unlabeled data.
A. Data loss prevention (DLP) systems can use labels on data to determine the appropriate controls to apply to the data. DLP systems won’t modify labels in real time and typically don’t work directly with firewalls to stop traffic. Deleting unlabeled data would cause big problems for organizations that haven’t labeled every piece of data!
- Why is it cost effective to purchase high-quality media to contain sensitive data?
a. Expensive media is less likely to fail.
b. The value of the data often far exceeds the cost of the media.
c. Expensive media is easier to encrypt.
d. More expensive media typically improves data integrity.
B. The value of the data contained on media often exceeds the cost of the media, making more expensive media that may have a longer life span or additional capabilities like encryption support a good choice. While expensive media may be less likely to fail, the reason it makes sense is the value of the data, not just that it is less likely to fail. In general, the cost of the media doesn’t have anything to do with the ease of encryption, and data integrity isn’t ensured by better media.
- Chris is responsible for workstations throughout his company and knows that some of the company’s workstations are used to handle proprietary information. Which option best describes what should happen at the end of their lifecycle for workstations he is responsible for?
a. Erasing
b. Clearing
c. Sanitization
d. Destruction
C. Sanitization is a combination of processes that ensure that data from a system cannot be recovered by any means.
Erasing and clearing are both prone to mistakes and technical problems that can result in remnant data and don’t make sense for systems that handled proprietary information. Destruction is the most complete method of ensuring that data cannot be exposed, and some organizations opt to destroy the entire workstation, but that is not a typical solution due to the cost involved.
- Which is the proper order from least to most sensitive for US government classifications?
a. Confidential, Secret, Top Secret
b. Confidential, Classified, Secret
c. Top Secret, Secret, Classified, Public, Classified, Top Secret
d. Public, Unclassified, Classified, Top Secret
A. The US government’s classification levels from least to most sensitive are Confidential, Secret, and Top Secret.
- What scenario describes data at rest?
a. Data in an IPsec tunnel
b. Data in an e-commerce transaction
c. Data stored on a hard drive
d. Data stored in RAM
C. Data at rest is inactive data that is physically stored. Data in an IPsec tunnel or part of an e-commerce transaction is data in motion. Data in RAM is ephemeral and is not inactive
- If you are selecting a security standard for a Windows 10 system that processes credit cards, what security standard is your best choice?
a. Microsoft’s Windows 10 security baseline
b. The CIS Windows 10 baseline
c. PCI DSS
d. The NSA Windows 10 baseline
C. PCI DSS, the Payment Card Industry Data Security Standard, provides the set of requirements for credit card processing systems. The Microsoft, NSA, and CIS baseline are all useful for building a Windows 10 security standard, but they aren’t as good of an answer as the PCI DSS standard itself.
Use the following scenario for questions 23, 24, and 25.
The Center for Internet Security (CIS) works with subject matter experts from a variety of industries to create lists of security controls for operating systems, mobile devices, server software, and network devices. Your organization has decided to use the CIS benchmarks for your systems. Answer the following questions based on this decision.
- The CIS benchmarks are an example of what practice?
a. Conducting a risk assessment
b. Implementing data labeling
c. Proper system ownership
d. Using security baselines
D. The CIS benchmarks are an example of a security baseline. A risk assessment would help identify which controls were needed, and proper system ownership is an important part of making sure baselines are implemented and maintained. Data labeling can help ensure that controls are applied to the right systems and data.
Use the following scenario for questions 23, 24, and 25.
The Center for Internet Security (CIS) works with subject matter experts from a variety of industries to create lists of security controls for operating systems, mobile devices, server software, and network devices. Your organization has decided to use the CIS benchmarks for your systems. Answer the following questions based on this decision.
- Adjusting the CIS benchmarks to your organization’s mission and your specific IT systems would involve what two processes?
a. Scoping and selection
b. Scoping and tailoring
c. Baselining and tailoring
d. Tailoring and selection
B. Scoping involves selecting only the controls that are appropriate for your IT systems, while tailoring matches your organization’s mission and the controls from a selected baseline. Baselining is the process of configuring a system or software to match a baseline, or building a baseline itself. Selection isn’t a technical term used for any of these processes.
Use the following scenario for questions 23, 24, and 25.
The Center for Internet Security (CIS) works with subject matter experts from a variety of industries to create lists of security controls for operating systems, mobile devices, server software, and network devices. Your organization has decided to use the CIS benchmarks for your systems. Answer the following questions based on this decision.
- How should you determine what controls from the baseline a given system or software package should receive?
a. Consult the custodians of the data.
b. Select based on the data classification of the data it stores or handles.
c. Apply the same controls to all systems.
d. Consult the business owner of the process the system or data supports.
B. The controls implemented from a security baseline should match the data classification of the data used or stored on the system. Custodians are trusted to ensure the day-to-day security of the data and should do so by ensuring that the baseline is met and maintained. Business owners often have a conflict of interest between functionality and data security, and of course, applying the same controls everywhere is expensive and may not meet business needs or be a responsible use of resources.
- What problem with FTP and Telnet makes using SFTP and SSH better alternatives?
a. FTP and Telnet aren’t installed on many systems.
b. FTP and Telnet do not encrypt data.
c. FTP and Telnet have known bugs and are no longer maintained.
d. FTP and Telnet are difficult to use, making SFTP and SSH the preferred solution.
B. FTP and Telnet do not provide encryption for the data they transmit and should not be used if they can be avoided. SFTP and SSH provide encryption to protect both the data they send and the credentials that are used to log in via both utilities.
- The government defense contractor that Saria works for has recently shut down a major research project and is planning on reusing the hundreds of thousands of dollars of systems and data storage tapes used for the project for other purposes. When Saria reviews the company’s internal processes, she finds that she can’t reuse the tapes and that the manual says they should be destroyed. Why isn’t Saria allowed to degauss and then reuse the tapes to save her employer money?
a. Data permanence may be an issue.
b. Data remanence is a concern.
c. The tapes may suffer from bitrot.
d. Data from tapes can’t be erased by degaussing.
B. Many organizations require the destruction of media that contains data at higher levels of classification. Often the cost of the media is lower than the potential costs of data exposure, and it is difficult to guarantee that reused media doesn’t contain remnant data. Tapes can be erased by degaussing, but degaussing is not always fully effective. Bitrot describes the slow loss of data on aging media, while data permanence is a term sometimes used to describe the life span of data and media.
- Information maintained about an individual that can be used to distinguish or trace their identity is known as what type of information?
a. Personally identifiable information (PII)
b. Personal health information (PHI)
c. Social Security number (SSN)
d. Secure identity information (SII)
A. NIST Special Publication 800-122 defines PII as any information that can be used to distinguish or trace an individual’s identity, such as name, Social Security number, date and place of birth, mother’s maiden name, biometric records, and other information that is linked or linkable to an individual such as medical, educational, financial, and employment information. PHI is health-related information about a specific person, Social Security numbers are issued to individuals in the United States, and SII is a made-up term.
- What is the primary information security risk to data at rest?
a. Improper classification
b. Data breach
c. Decryption
d. Loss of data integrity
B. The biggest threat to data at rest is typically a data breach. Data at rest with a high level of sensitivity is often encrypted to help prevent this. Decryption is not as significant of a threat if strong encryption is used and encryption keys are well secured. Data integrity issues could occur, but proper backups can help prevent this, and of course data could be improperly classified, but this is not the primary threat to the data.
- Full disk encryption like Microsoft’s BitLocker is used to protect data in what state?
a. Data in transit
b. Data at rest
c. Unlabeled data
d. Labeled dat
B. Full disk encryption only protects data at rest. Since it encrypts the full disk, it does not distinguish between labeled and unlabeled data.
- Sue’s employer has asked her to use an IPsec VPN to connect to its network. When Sue connects, what does the IPsec VPN allow her to do?
a. Send decrypted data over a public network and act like she is on her employer’s internal network.
b. Create a private encrypted network carried via a public network and act like she is on her employer’s internal network.
c. Create a virtual private network using TLS while on her employer’s internal network.
d. Create a tunneled network that connects her employer’s network to her internal home network.
B. One way to use an IPsec VPN is to create a private, encrypted network (or tunnel) via a public network, allowing users to be a virtual part of their employer’s internal network. IPsec is distinct from TLS, provides encryption for confidentiality and integrity, and of course, in this scenario Sue is connecting to her employer’s network rather than the employer connecting to hers.
- What is the primary purpose of data classification?
a. It quantifies the cost of a data breach.
b. It prioritizes IT expenditures.
c. It allows compliance with breach notification laws.
d. It identifies the value of the data to the organization.
D. Classification identifies the value of data to an organization. This can often help drive IT expenditure prioritization and could help with rough cost estimates if a breach occurred, but that’s not the primary purpose. Finally, most breach laws call out specific data types for notification rather than requiring organizations to classify data themselves.
- Fred’s organization allows downgrading of systems for reuse after projects have been finished and the systems have been purged. What concern should Fred raise about the reuse of the systems from his Top Secret classified project for a future project classified as Secret?
a. The Top Secret data may be commingled with the Secret data, resulting in a need to relabel the system.
b. The cost of the sanitization process may exceed the cost of new equipment.
c. The data may be exposed as part of the sanitization process.
d. The organization’s DLP system may flag the new system due to the difference in data labels.
B. Downgrading systems and media is rare due to the difficulty of ensuring that sanitization is complete. The need to completely wipe (or destroy) the media that systems use means that the cost of reuse is often significant and may exceed the cost of purchasing a new system or media. The goal of purging is to ensure that no data remains, so commingling data should not be a concern, nor should the exposure of the data; only staff with the proper clearance should handle the systems! Finally, a DLP system should flag data based on labels, not on the system it comes from.
- Which of the following concerns should not be part of the decision when classifying data?
a. The cost to classify the data
b. The sensitivity of the data
c. The amount of harm that exposure of the data could cause
d. The value of the data to the organization
A. Classification should be conducted based on the value of the data to the organization, its sensitivity, and the amount of harm that could result from exposure of the data. Cost should be considered when implementing controls and is weighed against the damage that exposure would create.
- Which of the following is the least effective method of removing data from media?
a. Degaussing
b. Purging
c. Erasing
d. Clearing
C. Erasing, which describes a typical deletion process in many operating systems, typically removes only the link to the file, and leaves the data that makes up the file itself. The data will remain in place but not indexed until the space is needed and it is overwritten. Degaussing works only on magnetic media, but it can be quite effective on it. Purging and clearing both describe more elaborate removal processes.
- Safe Harbor is part of a US program to meet what European Union law?
a. The EU CyberSafe Act
b. The Network and Information Security (NIS) directives
c. The General Data Protection Regulation (GDPR)
d. The EU Data Protection Directive
D. Safe Harbor is a framework intended to bridge the different privacy protection laws between the United States and the European Union and is run by the US Department of Commerce. At the time of this writing, Safe Harbor had been declared “invalid” by the European Court of Justice, although the US Department of Commerce has stated that it will continue the Safe Harbor program.
Both the GDPR and NIS are pending EU regulations, and there is no EU CyberSafe Act.
Use the following scenario to answer questions 37, 38, and 39.
The healthcare company that Lauren works for handles HIPAA data as well as internal business data, protected health information, and day-to-day business communications. Its internal policy uses the following requirements for securing HIPAA data at rest and in transit.
Image
Using the table, answer the following questions.
- What type of encryption would be appropriate for HIPAA documents in transit?
a. AES256
b. DES
c. TLS
d. SSL
C. TLS is a modern encryption method used to encrypt and protect data in transit. AES256 is a symmetric cipher often used to protect data at rest. DES and SSL are both outdated encryption methods and should not be used for data that requires high levels of security.
Use the following scenario to answer questions 37, 38, and 39.
The healthcare company that Lauren works for handles HIPAA data as well as internal business data, protected health information, and day-to-day business communications. Its internal policy uses the following requirements for securing HIPAA data at rest and in transit.
Image
Using the table, answer the following questions.
- Lauren’s employer asks Lauren to classify patient X-ray data that has an internal patient identifier associated with it but does not have any way to directly identify a patient. The company’s data owner believes that exposure of the data could cause damage (but not exceptional damage) to the organization. How should Lauren classify the data?
a. Public
b. Sensitive
c. Private
d. Confidential
C. Private data is typically considered data that could cause damage. Loss of confidential data is normally classified as able to cause exceptionally grave damage, while exposure of private data could cause serious damage. As you’d expect, public data exposure won’t cause damage.
Use the following scenario to answer questions 37, 38, and 39.
The healthcare company that Lauren works for handles HIPAA data as well as internal business data, protected health information, and day-to-day business communications. Its internal policy uses the following requirements for securing HIPAA data at rest and in transit.
Image
Using the table, answer the following questions.
- What technology could Lauren’s employer implement to help prevent confidential data from being emailed out of the organization?
a. DLP
b. IDS
c. A firewall
d. UDP
A. A data loss prevention (DLP) system or software is designed to identify labeled data or data that fits specific patterns and descriptions to help prevent it from leaving the organization. An IDS is designed to identify intrusions. Although some IDS systems can detect specific types of sensitive data using pattern matching, they have no ability to stop traffic. A firewall uses rules to control traffic routing, while UDP is a network protocol.
- A US government database contains Secret, Confidential, and Top Secret data. How should it be classified?
a. Top Secret
b. Confidential
c. Secret
d. Mixed classification
A. When data is stored in a mixed classification environment, it is typically classified based on the highest classification of data included. In this case, the US government’s highest classification is Top Secret. Mixed classification is not a valid classification in this scheme.