Domain 2 Continued Flashcards

1
Q

Emails and other freeform text

A

Unstructured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Example of structured data

A

Database data - carefully defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Semi-structured data

A

XML, JSON - structure without tight control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A language that allows you to share and store data in sharable manner, supports info exchange b/w websites, 3rd party apps, etc.

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data written as name/value pairs, serializes structured data to share over network

A

JSON

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What phase of data lifecycle does labeling occur?

A

Creation and sometimes use as data is modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why do DLP systems need to be specially configured in cloud environment?

A

Because encryption for data in transit and in motion could prevent access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can DLP systems use to identify data?

A

Pattern matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Checking the sequence of tokens for a pattern.

A

Pattern matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Preventing loss requires understanding:

A

When data is going somewhere.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Source and destination IP address and privileged access are examples of _____.

A

Common log data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the only way to ensure drives and volumes hosted by 3rd party is securely cleared?

A

Cryptographic erasure or crypto-shredding, couldn’t do physical destruction like degaussing b/c of contract limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when you replace data with alternate characters?

A

Masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What techniques remove data that would allow individuals to be identified?

A

Anonymization or deidentification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Referencing data with a hash, issue is some properties needed for testing can be lost.

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What technique moves data around but leaves it in place to be tested?

A

Randomization or shuffling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CSV files, XML, NoSQL databases, and HTML files

A

Semi-structured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Allows data to be saved in tabular format, any regular spreadsheet

A

CSV files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Stores data in format other than relational tables.

A

NoSQL Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Contains data that’s related to other data therein

A

Relational table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Will information about systems being created and destroyed exist on local system?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

syslog, syslog-ng, local logs

A

Local system logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Does Linux have an application log?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

T/F: Event and application logs are common for Windows systems

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Are original source IP addresses visible in load-balancer logs?
Yes. Source, destination IP and destination port, and actual query
26
A communication endpoint in networking
Port
27
Can you perform operations on hashed data using strings or numbers?
No, b/c hashing converts variable length data to fixed-length outputs
28
What's the practice of ensuring important data is stored in more than one place?
Data dispersion. Doesn't require a specific distance, or deletion of data not in secure storage, and you don't need to use multiple data sets to access data.
29
What is storage associated with an instance that will be destroyed when instance is shut down?
Ephemeral storage
30
What is storage you have direct access to?
Raw storage. Think hard-drive or SSD
31
What is long-term storage?
Storage that is intended to continue existing.
32
Storage allocated as a virtual drive or device within cloud.
Volume-based storage
33
What's commonly used to classify data?
Sensitivity, jurisdiction, criticality
34
What's most helpful in helping DLP systems identify and manage data?
Labels. Classification ok, but not good w/out tags. Hashing ok, but is done by DLP system when needed.
35
Maintaining chain of custody documentation and hashing files to make sure they're not changed from their original form is commonly done to support _____ ?
nonrepudiation
36
Inadvertent exposure, malicious access, and loss of forensic artifacts are security concerns for _____ storage.
ephemeral
37
T/F: Ephemeral storage is less likely to have remnant data in unallocated or reallocated sectors not normally purged through typical wipe operations
True
38
T/F: Its difficult to perform discovery against unstructured data.
True, b/c it's unlabeled
39
What does geolocation attempt to identify?
The location of a given IP address
40
What's the best way to have actual data for testing?
Shuffling. Hashing, randomization, and masking all remove or modify data significantly.
41
T/F: Creation and deletion event logging is supported by object-based filesystems
True
42
What policies include language that address legal holds?
Retention policies
43
What's the best way to store keys?
Encrypted in a hardware security module or key vault
44
When is an IRM most heavily used to ensure data is not inadvertently exposed or misused?
During sharing
45
Data mapping ______ ________ in _________ to allow them to be integrated.
matches fields, databases
46
T/F: You can add labels to filename.
False, best to add as part of metadata
47
Once a key is lost,
it cannot be recovered and the data should be considered to be lost
48
Can hashing be reveresed?
No
49
Is hashing a form of encryption?
No
50
What data is easiest to perform discovery actions on?
Structured data
51
Can you perform discovery on encrypted data?
No.
52
Which is easier to discover? Unstructured or semi-structured data?
Semi structured
53
A process that tracks the movement of evidence through its collection, safeguarding, and analysis lifecycle by documenting each person who handled the evidence, the date/time it was collected or transferred, and the purpose for any transfers.
Chain of custody
54
Matching fields in databases to allow for data migration.
Data mapping
55
Identify classification levels, assign responsibilities, and define roles
classification policies
56
When's the best time to label data?
At creation to ensure it can be handled properly through rest of lifecycle. Better to use auto labeling.
57
Would a breach of the token database result in a customer data breach?
No, b/c the actual customer data is stored in a separate database.
58
T/F: Timestamps are time-consuming to check and may be modified when files are copied.
True
59
T/F: Dispersion is the concept of ensuring data is in multiple locations so that a single failure, event, or loss cannot result in the destruction or loss of data.
True
60
What are the data lifecycle stages, in order?
Create - Store - Use - Share - Archive - Destroy
61
T/F: Hashes are one-way functions and cannot be reveresed.
True
62
Hashes generate ______ output from variable-length output.
Fixed length. Identical files will generate identical output.
63
What is it called when two different files generate the same output?
Collision
64
IRM ensures _______ and _______ to data are appropriately managed as data moves around the org and potentially leaves it.
Privileges and access
65
Labeling is done as part of what phase of the data lifecycle?
Creation
66
Provisioning may be done at any time but is often associated with what phase of the data lifecycle?
Use
67
Retention periods, compliance requirements, lifecycle requirements, archiving and retrieval procedures, and data classification are often included in a:
Data retention policy. Not data value.
68
Volume-based storage is allocated as a
Virtual drive or device w/in cloud
69
T/F: SharePoint and Microsoft Office don't natively support IRM.
False
70
What is the software approach of building, deploying, and managing modern applications in cloud computing environments.
Cloud native
71
What technologies support fast and frequent changes to applications without impacting service delivery, providing adopters with an innovative, competitive advantage.
Cloud native
72
Scanning for sensitive data, classifying data, and mapping data to compliance requirements are cataloging efforts that _____ can help speed up.
Metadata
73