Domain 2: Asset Security Flashcards

1
Q

What are the government classifications for data?

A

Top Secret, Secret, and Confidential, and Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of information should the ‘top secret’ classification be applied to?

A

“Top Secret” shall be applied to information, of which the unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the four business classifications for data?

A

Business classifications: highly sensitive, sensitive, internal, public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the data owner responsible for?

A

The data owner (also called information owner) is a manager responsible for ensuring that specific data is protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the system owner responsible for?

A

The system owner is a manager who is responsible for the actual computers that house data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a data custodian provide?

A

A data custodian provides hands-on protection of assets, such as data backups and restores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do data controllers do?

A

Data controllers create and manage sensitive data within an organization. Human resources employees are often data controllers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is PROM?

A

PROM (Programmable read only memory) – Can only be written once, normally at the factory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is EPROM?

A

EPROM (Erasable programmable read only memory) – Can be erased (flashed) and written many times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is EEPROM?

A

EEPROM (Electrically erasable programmable read only memory) – These are electrically erasable, you can use a flashing program. This is still called read only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the difference between deleting, formatting, and overwriting?

A

Deleting, formatting and overwriting (Soft destruction):
Deleting a file just removes it from the table; everything is still recoverable.
Formatting does the same but it also puts a new file structure over the old one. Still recoverable in most cases.
Overwriting is done by writing 0’s or random characters over the data.
As far as we know there is no tool available that can recover even single pass overwriting (not possible on damaged media).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of information should the ‘secret’ classification be applied to?

A

“Secret” shall be applied to information, of which the unauthorized disclosure could reasonably be expected to cause serious damage to national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of information should the ‘confidential’ classification be applied to?

A

“Confidential” shall be applied to information, of which the unauthorized disclosure could reasonably be expected to cause damage to national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EPROM (Erasable Programmable Read Only memory) – Can be erased (flashed) and written many times, by shining an ultraviolet light (flash) on a small window on the chip (normally covered by foil).

A

We are wanting to erase EPROM memory to update to the latest firmware. How would we do that?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What types of memory are non-volatile?

A

ROM (Read Only memory) is nonvolatile (retains memory after power loss).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

We are implementing some new standards and framework in our organization. We chose to use scoping on one of the standards we are implementing. What does scoping mean?

A

Scoping is determining which portion of a standard we will deploy in our organization. We take the portions of the standard that we want or that apply to our industry, and determine what is in scope and what is out of scope for us.

17
Q

We are making our procedures on proper use and disposal of Solid-State Drive (SSD). Which type of which drives are they?

A

A SSD is a combination of flash memory (EEPROM) and DRAM.

18
Q

When using the formal approval process, what is required to access data?

A

Formal Access Approval: Document from the data owner approving access to the data for the subject. Subject must understand all requirements for accessing the data and the liability involved if compromised, lost or destroyed. Appropriate Security Clearance is required as well as the Formal Access Approval.

19
Q

In the US government data classification scheme, data that, if disclosed, could cause damage to national security is classified as?

A

Confidential

20
Q

In the US government’s data classification scheme, what would data “if disclosed, could cause serious damage to national security”, be classified as?

A

Secret

21
Q

Looking at the data classifications classes of the US government: data that, if disclosed, won’t cause any harm to national security, would be classified as?

A

Unclassified

22
Q

What type of data destruction would we use to ensure there is no data remanence on our PROM?

A

We can’t overwrite, format or degauss PROM. The only way to ensure destruction is shredding.

23
Q

Which type of Random-Access memory (RAM) could be embedded in the Central Processing Unit (CPU)?

A

SRAM (Static RAM): Fast and Expensive. Uses latches to store bits (Flip-Flops). Does not need refreshing to keep data, keeps data until power is lost. This can be embedded on the CPU.

24
Q

When a system has been certified, what does that mean?

A

Certification is when a system has been certified to meet the security requirements of the system owner. Certification considers the system, the security measures taken to protect the system, and the residual risk represented by the system.

25
Q

What is multi-state processing?

A

Enables a system to operate at more than one classification level simultaneously.