Domain 2 Continued Flashcards

1
Q

Emails and other freeform text

A

Unstructured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Example of structured data

A

Database data - carefully defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Semi-structured data

A

XML, JSON - structure without tight control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A language that allows you to share and store data in sharable manner, supports info exchange b/w websites, 3rd party apps, etc.

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data written as name/value pairs, serializes structured data to share over network

A

JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What phase of data lifecycle does labeling occur?

A

Creation and sometimes use as data is modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why do DLP systems need to be specially configured in cloud environment?

A

Because encryption for data in transit and in motion could prevent access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can DLP systems use to identify data?

A

Pattern matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Checking the sequence of tokens for a pattern.

A

Pattern matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Preventing loss requires understanding:

A

When data is going somewhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Source and destination IP address and privileged access are examples of _____.

A

Common log data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the only way to ensure drives and volumes hosted by 3rd party is securely cleared?

A

Cryptographic erasure or crypto-shredding, couldn’t do physical destruction like degaussing b/c of contract limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when you replace data with alternate characters?

A

Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What techniques remove data that would allow individuals to be identified?

A

Anonymization or deidentification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Referencing data with a hash, issue is some properties needed for testing can be lost.

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What technique moves data around but leaves it in place to be tested?

A

Randomization or shuffling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CSV files, XML, NoSQL databases, and HTML files

A

Semi-structured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Allows data to be saved in tabular format, any regular spreadsheet

A

CSV files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Stores data in format other than relational tables.

A

NoSQL Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Contains data that’s related to other data therein

A

Relational table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Will information about systems being created and destroyed exist on local system?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

syslog, syslog-ng, local logs

A

Local system logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Does Linux have an application log?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

T/F: Event and application logs are common for Windows systems

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Are original source IP addresses visible in load-balancer logs?

A

Yes. Source, destination IP and destination port, and actual query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A communication endpoint in networking

A

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Can you perform operations on hashed data using strings or numbers?

A

No, b/c hashing converts variable length data to fixed-length outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What’s the practice of ensuring important data is stored in more than one place?

A

Data dispersion. Doesn’t require a specific distance, or deletion of data not in secure storage, and you don’t need to use multiple data sets to access data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is storage associated with an instance that will be destroyed when instance is shut down?

A

Ephemeral storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is storage you have direct access to?

A

Raw storage. Think hard-drive or SSD

31
Q

What is long-term storage?

A

Storage that is intended to continue existing.

32
Q

Storage allocated as a virtual drive or device within cloud.

A

Volume-based storage

33
Q

What’s commonly used to classify data?

A

Sensitivity, jurisdiction, criticality

34
Q

What’s most helpful in helping DLP systems identify and manage data?

A

Labels. Classification ok, but not good w/out tags. Hashing ok, but is done by DLP system when needed.

35
Q

Maintaining chain of custody documentation and hashing files to make sure they’re not changed from their original form is commonly done to support _____ ?

A

nonrepudiation

36
Q

Inadvertent exposure, malicious access, and loss of forensic artifacts are security concerns for _____ storage.

A

ephemeral

37
Q

T/F: Ephemeral storage is less likely to have remnant data in unallocated or reallocated sectors not normally purged through typical wipe operations

A

True

38
Q

T/F: Its difficult to perform discovery against unstructured data.

A

True, b/c it’s unlabeled

39
Q

What does geolocation attempt to identify?

A

The location of a given IP address

40
Q

What’s the best way to have actual data for testing?

A

Shuffling. Hashing, randomization, and masking all remove or modify data significantly.

41
Q

T/F: Creation and deletion event logging is supported by object-based filesystems

A

True

42
Q

What policies include language that address legal holds?

A

Retention policies

43
Q

What’s the best way to store keys?

A

Encrypted in a hardware security module or key vault

44
Q

When is an IRM most heavily used to ensure data is not inadvertently exposed or misused?

A

During sharing

45
Q

Data mapping ______ ________ in _________ to allow them to be integrated.

A

matches fields, databases

46
Q

T/F: You can add labels to filename.

A

False, best to add as part of metadata

47
Q

Once a key is lost,

A

it cannot be recovered and the data should be considered to be lost

48
Q

Can hashing be reveresed?

A

No

49
Q

Is hashing a form of encryption?

A

No

50
Q

What data is easiest to perform discovery actions on?

A

Structured data

51
Q

Can you perform discovery on encrypted data?

A

No.

52
Q

Which is easier to discover? Unstructured or semi-structured data?

A

Semi structured

53
Q

A process that tracks the movement of evidence through its collection, safeguarding, and analysis lifecycle by documenting each person who handled the evidence, the date/time it was collected or transferred, and the purpose for any transfers.

A

Chain of custody

54
Q

Matching fields in databases to allow for data migration.

A

Data mapping

55
Q

Identify classification levels, assign responsibilities, and define roles

A

classification policies

56
Q

When’s the best time to label data?

A

At creation to ensure it can be handled properly through rest of lifecycle. Better to use auto labeling.

57
Q

Would a breach of the token database result in a customer data breach?

A

No, b/c the actual customer data is stored in a separate database.

58
Q

T/F: Timestamps are time-consuming to check and may be modified when files are copied.

A

True

59
Q

T/F: Dispersion is the concept of ensuring data is in multiple locations so that a single failure, event, or loss cannot result in the destruction or loss of data.

A

True

60
Q

What are the data lifecycle stages, in order?

A

Create - Store - Use - Share - Archive - Destroy

61
Q

T/F: Hashes are one-way functions and cannot be reveresed.

A

True

62
Q

Hashes generate ______ output from variable-length output.

A

Fixed length. Identical files will generate identical output.

63
Q

What is it called when two different files generate the same output?

A

Collision

64
Q

IRM ensures _______ and _______ to data are appropriately managed as data moves around the org and potentially leaves it.

A

Privileges and access

65
Q

Labeling is done as part of what phase of the data lifecycle?

A

Creation

66
Q

Provisioning may be done at any time but is often associated with what phase of the data lifecycle?

A

Use

67
Q

Retention periods, compliance requirements, lifecycle requirements, archiving and retrieval procedures, and data classification are often included in a:

A

Data retention policy. Not data value.

68
Q

Volume-based storage is allocated as a

A

Virtual drive or device w/in cloud

69
Q

T/F: SharePoint and Microsoft Office don’t natively support IRM.

A

False

70
Q

What is the software approach of building, deploying, and managing modern applications in cloud computing environments.

A

Cloud native

71
Q

What technologies support fast and frequent changes to applications without impacting service delivery, providing adopters with an innovative, competitive advantage.

A

Cloud native

72
Q

Scanning for sensitive data, classifying data, and mapping data to compliance requirements are cataloging efforts that _____ can help speed up.

A

Metadata

73
Q
A