Policy and Privacy Concepts Flashcards

1
Q

A set of procedures an investigator follows when examining a computer security incident

A

Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The record of evidence history from collection to court presentation and disposal

A

Chain of Custody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bag that shields devices from outside signals to prevent data from being altered, deleted, or added to a new device

A

Faraday Bag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Process designed to preserves all relevant information when litigation (lawsuit) is expected to occur

A

Legal Hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collecting evidence that could be easily tampered or destroyed first

A

Order of Volatility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

License that allows one individual user to use a piece of software on their given machine

A

Personal License

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A license for each individual machine or person who is actively using that license

A

Corporate License

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dictates the terms and conditions of the license for a software a user must accept to use

A

(EULA) End User License Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ensures copy production for music and video that is being used in an online or digital manner

A

DRM (Digital Rights Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Maintains and controls certain data to comply with business policies and applicable laws and regulations

A

Data Retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Keeping information for a specific purpose outside of an organization’s data retention policy

A

Data Preservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The max amount of time that can be lost from a recovery after a disaster, failure, or other event.

A

Recovery Point Objective (RPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DLP

A

Data Loss Prevention (from Microsoft)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 4 forms of regulated data covered by the exam?

A

1) PII (Personally Identifiable Info)
2) PHI (Personal Health Info)
3) PCI DSS (Credit card transactions)
4) GDPR (General Data Protection Regulation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Defines the rules that restrict how a computer, network, or other systems may be used

A

AUP (Acceptable Use Policy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Defines the structured way of changing the state of a computer system, network, or IT procedure

A

Change Management

17
Q

Dictates what types of things need to be done when an employee is hired, fired, or quits

A

Onboarding and Offboarding Policy

18
Q

One of the “Due’s” that ensures IT infrastructure risks are known and managed properly

A

Due Diligence

19
Q

One of the “Due’s” that mitigates actions that an organization takes to defend against the risks that have been uncovered during due diligence

20
Q

One of the “Due’s” that is a legal term that refers to how an organization must respect and safeguard personnel’s rights
(Protects citizens from their government and companies from lawsuits)

A

Due Process

21
Q

Which of the following is considered a form of regulated data?

a) PII
b) AUP
c) DMCA
d) DRM

A

a) PII

The four forms of regulated data covered by the exam are PII (Personally Identifiable Information), PCI (Payment Card Industry), GDPR (General Data Protection Regulation), and PHI (Protected Health Information). Personally identifiable information (PII) is data used to identify, contact, or locate an individual. Information such as social security number (SSN), name, date of birth, email address, telephone number, street address, and biometric data is considered PII.

22
Q

Which of the following is required for evidence to be admissible in a court of law?

a) Order of volatility
b) Legal hold
c) Chain of custody
d) Right to audit

A

c) Chain of custody

Chain of custody forms list every person who has worked with or who has touched the evidence that is a part of an investigation. These forms record every action taken by each individual in possession of the evidence. Depending on the organization’s procedures, manipulation of evidence may require an additional person to act as a witness to verify whatever action is being taken.

23
Q

You are working as a defense contractor for the U.S. Army. The Army is looking to purchase Microsoft Office for all of its employees to use. Which of the following licenses would be BEST for this sized organization to purchase?

a) Personal
b) Business
c) Enterprise
d) Open-source

A

c) Enterprise

An enterprise license is like a business license, but for an unlimited number of users and is designed for large corporate and government networks. A business license is the standard licensing option for organizations and business entities. With Microsoft, a company can purchase anywhere from 1 to 300 user licenses under the business license program. A Personal license is an option for private individuals who purchase a license with their own funds and solely for their own use. Personal licenses are not to be purchased, refunded, or in any way financed by companies.