Policies To Protect Data (Chapter 7) Flashcards

1
Q

Software tokens

A

A style of 2FA in which an external devices is promoted with a unique authentication code that allows the program to verify the correct user.
- prevents relay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Relay Attack

A

An attacker intercepts some authentication data and refuses it to try to re-establish a session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Remote Authentication Dail-in User Service (RADIUS)

A

Form of AAA used to manage remote and wireless authentication infrastructure, used for users to remotely log in to network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Terminal Access Controller Access Control System (TACACS+)

A

An alternative to RADIUS used for network administrator to remotely work with network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Policies hierarchy

A

Enforced Policy
OU policy
Domain Policy
Site policy
Local policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICM

A

Information Content Management
- the process of managing information over it’s lifecycle, from creation to deletion
Data is classified under sensitivity levels (unclassified, classified, confidential, secret and top secret) which will dictate how the data is handled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PII

A

Personal Identifiable Information
Data that can be used to identify or contact an individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PHI

A

Protected Health information
- information that identifies someone as the subject to medical and insurance records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PCI DSS

A

Protected Card Information Data Security Standard
- standard for organisations that process bank card payments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ACL

A

Access Control List
- The permission attached to or configured on a network resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ACE

A

Access Control Entries
- within an ALC, the records of subjects and permissions they hold on the resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encrypting File System

A

files and folders can be encrypted to ensure privacy of the data
- dive must be formatted with NTFS
- windows business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FDE

A

Full Disk Encryption
- encryption of all data on a disk and stores the encryption key on the motherboard TPM chip
- needs to be enabled in UEFI and BitLocker used to set up full disk encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DLP

A

Data Loss Prevention
Software that can identify data that has been classified and apply fine-grained user privileges to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Incident Response lifecycle

A

1) Preparation
2) Detection & Analysis
3) Containment Eradication & Recovery
4) Post-incident activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CSIRT

A

Computer Security Incident Response Team
- Team responsible for incident Response by providing a range of decisions and technical skills needed.