Operational Procedures: Explain the importance of prohibited content/activity and privacy, licensing, and policy concepts. Flashcards

CompTIA A+ 220-1102 Exam Criteria

1
Q

What type of incident we need to look for?

A

an event that disrupts normal business operations

The context is prohibted content in the work place. - Gambling/ adult sites etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is an incident response plan is?

A

Incident Response Plans

Documented plan outlining the steps to take following the discovery and confirmation of an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an incident Response Procedure?

A

Preparation

Training

Practice drills (mock data breaches)

Ensuring all resources are approved and funded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens on an Event of an incident before taking the procedure?

A

Identification

Determining if there is a breach (violation of a security policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What comes after Containment?

A

Containment

Data preservation (Drive seizure or copying)

Data integrity

Chain of Custody – evidence chain of custody form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is followed after containment?

A

Eradication (only for other types of breaches)

Determine root cause of breach

Malware removal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

After containment what must you follow up on doing?

A

Recovery

Reintroduce affected systems into production environment

Reimaging, restore from backup

Continuous Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To complete the whole Incident procedure what must we record after recovery?

A

Lessons Learned

Discuss the breach

What has the incident response team learned after the IRP was implement

What can the team do better next time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does an Open-Source license allows to do?

A

An open-source license allows you to modify an application’s source code, creating a customized version of the software. Most open-source software is available for free, and the software publisher generates revenue through service contracts, technical support, and add-on features. Some examples of open-source operating systems are Chrome OS and Android.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does DRM mean?

A

Digital Rights Management (DRM) controls how users may consume, install, store, or otherwise interact with copyrighted material they have purchased, such as e-books and digital music files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Personal Use License vs. Corporate Use Licenses

A

A personal use license is meant to be used by an individual. A single personal license may allow you to install the software on one or more systems. For example, Office 365 is a subscription-based software that can be installed on five systems at one time.

Corporate use licenses are meant to be used within organizations. Individual users use them but only for business purposes on their laptops or desktops. Organizations fund corporate licenses for users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is EULA?

A

EULA
EULA is the End User License Agreement. Each software, such as enterprise or commercial, is equipped with EULA, which states how an end-user should use the software. For example, EULA may state that the software is meant only for personal purposes and cannot be used for commercial use.

There are two types of EULA:

Shrink wrap: These are placed on the software boxes. The user would consent to the EULA by breaking the shrink wrap.
Clickwrap: These are built within the software. The user must accept the EULA to use the software. These are also found on Websites. For example, you would accept the EULA, and then you can access the online services being offered on the Website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Commercial License?

A

For a commercial license, the source code is closed and proprietary to the developer, and not available for modification. Some examples of commercially-licensed operating systems are Microsoft’s Windows and Apple’s iOS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is enterprise license?

A

Enterprise licenses are geared towards larger companies that need to install the software on hundreds or thousands of machines. Enterprise licenses are less expensive than personal licenses for each installation, although the overall price will be much higher because of the high volume of licenses that will be purchased. An enterprise license is typically granted for a commercial application. Some open source operating systems have licenses, but most of them do not.

Within any given company, many devices, programs, and applications require licenses for an organization to legally own and use their services. As an organization grows, it can become cumbersome to manage these licenses, but doing so is important to prevent any legal trouble or fines. Your organization should implement routine license monitoring to ensure that every license in use is valid or due to expire. The IT department should keep careful track of all licensed resources, including software and hardware, and should manage those licenses to ensure that services are not interrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens to an expired license vs non-expired license?

A

An expired license, even for a service or application that you purchased, means that the organization or system is no longer authorized to use the application. Continuing to use the application after license expiration could result in legal and security issues. Legal issues arise when the organization no longer has rights to use the software, and security issues arise when the organization can no longer use the vendor’s licensed services to update the software. A non-expired licenses means the organization can still use the software and obtain regular updates from the software vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why do data retention requirements exist?

A

Data retention requirements exist for certain types of sensitive data or records. For example, sensitive data being processed by a computer system, stored on media or accessed by a person. While organizations can create their own data retention policy, they must also adhere to a number of data retention laws, especially if these organizations operate within regulated industries and compliance laws.

17
Q

What does PII consist of?

A

Personally Identifiable Information (PII) is information that defines you as an individual. Personally identifiable information (PII) can be an individual’s race, name, date & place of birth, biometric, medical, financial, or employment information, social security number (SSN), phone number, address, etc. This information, along with credit card numbers and personal government-issued information, can be used in identity theft when a person impersonates you.

18
Q

Why is GDPR so important?

A

General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) is a new compliance standard started in the EU. Personal information no longer used must be removed by the company. Companies can be fined if they store required information only but cannot justify why they have the personal information.

19
Q

What is PHI?

A

Protected Health Information (PHI)
Protected Health Information (PHI) is any information that can be used to identify an individual. This information is created, used, or disclosed while providing health care services, such as a diagnosis or treatment. This information, along with medical records, conversations between doctors and nurses about treatment, billing information, and any patient-identifiable information, are all available in a health insurance company’s computer system.

In the US, PHI is protected through the Health Insurance Portability and Accountability Act (HIPAA). Any covered provider who handles your PHI must meet HIPAA’s requirements for data security and privacy, including health insurance companies and third-party healthcare providers like billing services and outpatient providers.

20
Q

What is PCI compliance?

A

Payment Card Industry (PCI) compliance is associated with electronic commerce, and how websites handle your credit card information.