Domain 2 Flashcards

1
Q

Data Destruction Methods

A

Erasing

Clearing (overwriting)

Purging

Degaussing

Destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Erasing

A

performing a delete operation against a file, files, or media. data is typically recoverable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Clearing (overwriting)

A

preparing media for reuse and ensuring data cannot be recovered using traditional recovery tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purging

A

a more intense form of clearing that prepares media for reuse in less secure environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Degaussing

A

creates a strong magnetic field that erases data on some media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Destruction

A

the final stage in the lifecycle of media and is the most secure method of sanitizing media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Government Data Classifications

A
Top Secret - Exceptionally grave damage
Secret - serious damage
Confidential - damage
(sensitive but unclassified - SBU)
Unclassified - no damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Non-Government Data Classifications

A

Confidential/Proprietary - Exceptionally grave damage
Private - serious damage
Sensitive - damage
Public - no damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Owner

A

Usually a member of senior management. Can delegate some day to day duties. Cannot delegate total responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Custodian

A

Usually someone in the IT department. Does not decide what controls are
needed, but does implement controls for data owner.

If the questions mentions day-to-day it’s custodian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Administrators

A

Responsible for granting appropriate

access to personnel (often via RBAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

User

A

any person who accesses data via a computing system to accomplish work tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Business/Mission Owners

A

Can overlap with the responsibilities of the system owner or be same role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Asset Owners

A

Owns asset or system that processes

sensitive data and associated security plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

GDPR Term: Data Processor

A

A natural or legal person, public authority,

agency, or other body, which processes personal data solely on behalf of the data controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

GDPR Term: Data Controller

A

The person or entity that controls

processing of the data.

17
Q

GDPR Term: Data Transfer

A

GDPR restricts data transfers to countries

outside the EU.

18
Q

GDPR Term: Anonymization

A

The process of removing all relevant data
so that it is impossible to identify original subject or person.

If done effectively, the GDPR is no longer relevant for the

Used if you don’t need the data.

19
Q

GDPR Term: Pseudonymization

A

The process of using pseudonyms
(aliases) to represent other data.

Can result in less stringent requirements than would otherwise apply under the GDPR.

Use if you need data and want to reduce exposure.