Domain 2 Continued Flashcards
Emails and other freeform text
Unstructured data
Example of structured data
Database data - carefully defined
Semi-structured data
XML, JSON - structure without tight control
A language that allows you to share and store data in sharable manner, supports info exchange b/w websites, 3rd party apps, etc.
XML
Data written as name/value pairs, serializes structured data to share over network
JSON
What phase of data lifecycle does labeling occur?
Creation and sometimes use as data is modified
Why do DLP systems need to be specially configured in cloud environment?
Because encryption for data in transit and in motion could prevent access to data.
What can DLP systems use to identify data?
Pattern matching
Checking the sequence of tokens for a pattern.
Pattern matching
Preventing loss requires understanding:
When data is going somewhere.
Source and destination IP address and privileged access are examples of _____.
Common log data
What’s the only way to ensure drives and volumes hosted by 3rd party is securely cleared?
Cryptographic erasure or crypto-shredding, couldn’t do physical destruction like degaussing b/c of contract limitations
What is it called when you replace data with alternate characters?
Masking
What techniques remove data that would allow individuals to be identified?
Anonymization or deidentification
Referencing data with a hash, issue is some properties needed for testing can be lost.
Hashing
What technique moves data around but leaves it in place to be tested?
Randomization or shuffling
CSV files, XML, NoSQL databases, and HTML files
Semi-structured data
Allows data to be saved in tabular format, any regular spreadsheet
CSV files
Stores data in format other than relational tables.
NoSQL Database
Contains data that’s related to other data therein
Relational table
Will information about systems being created and destroyed exist on local system?
No
syslog, syslog-ng, local logs
Local system logs
Does Linux have an application log?
No.
T/F: Event and application logs are common for Windows systems
True
Are original source IP addresses visible in load-balancer logs?
Yes. Source, destination IP and destination port, and actual query
A communication endpoint in networking
Port
Can you perform operations on hashed data using strings or numbers?
No, b/c hashing converts variable length data to fixed-length outputs
What’s the practice of ensuring important data is stored in more than one place?
Data dispersion. Doesn’t require a specific distance, or deletion of data not in secure storage, and you don’t need to use multiple data sets to access data.
What is storage associated with an instance that will be destroyed when instance is shut down?
Ephemeral storage