Lesson 9 - Chapter 4: Compliance and Auditing Flashcards

1
Q

Besides encryption, how else must IT professionals protect data? (3)

A
  1. handle it according to its classification
  2. enforcing user policies so data is handled appropriately in its use (at rest, transit, in use)
  3. apply classification to other software/hardware resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data classification?

A

organizing data according to its sensitivity

(for larger organizations, government entities and strict government regulations apply)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does using classification schemes allow employees/techs to know quickly? (2)

A
  1. what to do with documents
  2. what to do with drives containing documents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 4 types of regulated data?

A
  1. Personally Identifiable Information (PII)
  2. Protected Health Information (PHI)
  3. Payment Card Industry (PCI)
  4. General Data Protection Regulation (GDPR)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is PII?

A

Personally Identifiable Information

umbrella term for any data that can lead back to a specific individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is PHI?

A

Protected Health Information

any PII that involves a person’s health status, medical records, and healthcare services they received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is PCI and what does it stand for?

A

Payment Card Industry

a rigorous set of rules for systems that accept, transmit, process, or store credit/debit card payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is GDPR?

A

General Data Protection Regulation

a new law that defines a broad set of rights and protections for the personal information of citizens living in countries in the European Union

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does compliance mean?

A

members of a company/organization must comply with all of the rules that apply to that company

(hardware, software, data, network access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the point of compliance in IT?

A

designed to stop users with insufficient technical skill or knowledge from installing malicious programs/applications

(keeps technical support calls down)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

From a tech’s point of view, what’s the most common compliance issue?

A

software (what users can install or can’t)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You have a ___ ____ to use software in compliance with its license

A

legal obligation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you access software that released under a commercial license?

A

you have a legal obligation to pay money to access it

(before you could buy it, use it forever, sell it to someone, or give it away, etc but now it’s different as they want monthly fees)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a personal license grant you when you buy a monthly subscription to Microsoft 365?

A

enables you to share the software with several other people or accounts and use it on several of your personal machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does EULA stand for?

A

End User License Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the EULA?

A

End User License Agreement
you agree when you open or install new software, obliged to use the copyright holder’s sharing guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does DRM stand for?

A

Digital Rights Management

18
Q

What are you forbidden from doing if an application uses DRM?

A

the EULA forbids you from breaking, reverse-engineering, or removing the DRM protections

19
Q

Many non-commercial licensing has variations. Like what?

A

Many non-commercial programs are only free for personal use, to use it at the office you need a commercial license

20
Q

What does open source software license allow you to do?

A

allows you to take the original code and modify it

(some require you to make the modified code free to download, others no)

20
Q

What is closed source software? What does it not allow you to do?

A

you cannot modify the source code or make it part of some other software suite

21
Q

Not all open-source programs are ___

A

free

(compiled, ready-to-run versions may carry a price tag)

22
Q

A tech must know the specific licenses their company paid for and ensure that that company….

A

abides by those licenses

23
Q

What is shareware?

(besides another software distribution method)

A

software you’re free to use, but if you find it useful and continue to use it the owner asks you to pay a fee

(software may expire after a period or unlock features after paying)

24
Q

What is pay-to-win gaming?

A

the basic game is free but you buy helper items to make the game more winnable

(or make it ad-supported with ads that nag you to pay)

25
Q

If your security policies enable logging, where can you access them?

A

via Event Viewer

26
Q

To unlock the full potential of Event Viewer, you need to set up …..?

A

auditing

27
Q

What is auditing?

A

tell Windows to create an entry in the Security Log when certain events happen

28
Q

What is event auditing?

A

Windows creates a Security log when a user logs on

29
Q

What is object access auditing?

A

Windows creates a Security log when a user tries to access a certain file or folder

30
Q

How do you turn auditing policies on/off at a local level?

A

Local Security Policy (secpol)
2. Select ‘Local Policies’
3. click ‘Audit Policy’
4. Double-click one of the policies, select one or both of the checkboxes in dialog

31
Q

Where are Event Viewer logs stored?

A

%SystemRoot%\System32\Config

32
Q

What is incident reporting?

A

using documentation/documentation changes to report a system or network problem to a supervisor

33
Q

Do you need to do incident reporting?

A

Yes!

34
Q

What are 2 benefits that incident reporting provides?

A
  1. Provides a record of your work
  2. Provides information that can be combined with other data to reveal patterns or bigger problems to someone higher up the chain
35
Q

What is an AUP?

A

Acceptable Use Policy

defines what actions an employee may or may not perform on company equipment

(employees must sign this)

36
Q

What kinds of devices does an AUP cover?

A

computers, phones, printers, network

37
Q

What policy defines the handling of passwords, email and many other issues?

A

Acceptable Use Policy (AUP)

38
Q

What’s an incident response leader?

A

who you report any prohibited actions or content to (don’t speak to the person making the infraction unless OK’d by supervisor)

39
Q

What is chain of custody? What is it used for? (2)

A

a documented history of who has been in possession of the system

used for tracking of evidence/documenting

40
Q

What are the 3 fairly common rules to chain of custody steps?

A
  1. Isolate the system (store somewhere with no access)
  2. Document when you took control of system and actions took (shutting down, moving it, etc) to track the location
  3. If another person takes control of system, document transfer of custody