Domain 2 - Asset Security Flashcards

1
Q

Domain 2

A

Chapter 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Erasing

A

data is typically recoverable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Clearing (overwritting)

A

preparing media for reuse and ensuring data can not be covered using traditional recovery tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Purging

A

more intense form of clearing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Destruction

A

Most secure method of sanitizing media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data owner

A

senior management can delegate some day-to-day duties .. cannot delegate responsibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data custodian

A

Usually someone in the IT department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

data administrators

A

responsible for granting appropriate access to personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User

A

any person who accesses data via a computing device to accomplish work tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business/ mission owners

A

can overlap with responsibilities of the system owner or the same role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asset owners

A

owns asset or system that processes sensitive data and associated security plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

GDPR

A

General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

GDPR Roles

A

data processor - natural or legal person, public authority, agency, or other body, which processes personal data solely on behalf of the data controller

data controller - person or entity that controls processing of the data

Data transfer - GDPR restricts data transfers to countries outside the EU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Steps to reduce or eliminate GDPR requirements

A

Anonymization - the process of removing all relevant data so that it is impossible to identify original subject or person.

Pseduonymization - process of using pseudonyms (aliases) to represent the other data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security baselines

A

Controls in the baseline are recommended if a loss of confidentiality, integrity, or availability will have a ____ impack on the organization’s mission.

Low-impact baseline - Low

Moderate-impact baseline - moderate

High-impact - high impact

Privacy control baseline - Provides an initial baseline for any systems that process PII.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tailoring

A

modifying for baseline security controls

17
Q

DLP

A

Data loss prevention - system that detect and block data exfiltration attempts by scanning unencrypted and looking for keywords and data patterns.

18
Q

CASB

A

Cloud access security broker - software placed logically between users and cloud-based resources.

19
Q

Tokenization

A

Replaces data elements with a string of characters or a token.