Protecting Data Flashcards

1
Q

The primary methods of protecting the confidentiality of data are with…

A

encryption and strong access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are GNU Privacy Guard and EFS? What do they enforce?

A

GNU Privacy guard is the Linux OS tool used to support the functionality of encrypting and decrypting files and folders.
EFS = Encryption File System is the equivalent tool for Microsoft NTFS
They enforce file system security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is used in combination with the chmod command? What does it do?

A

The Chmod command changes file permissions on Linix systems. It is used in conjunction with a number which represents a certain configuration of permission across the owner, group and other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You’ve granted users write permission in a folder. they’ve created some files. But then they can’t access when they try to open them later, what could the problem be?

A

You haven’t assigned them Read access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What 3 things can a data loss prevention solution do when an unauthorized transfer is detected?

A

1_ block the transfer

2) log the event
3) alert security administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s the key difference between how a content filter on a UTM (Unified Threat Management) works and a DLP monitor?

A

UTM content filters look at inbound data streams whereas DLP (data loss prevention) monitors data going out of the company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can DLP system scan the content of to find confidential information that might be being deliberately moved out of the company?

A

Content of all emails including attachments. Even zipped files!
Content of network applications like FTP and HTTP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the 3 primary Linux entities you can assign permissions to in order of highest privilege

A

Owner
Group
Others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what permission level has been assigned to the below file?

log.txt —

A

No permission has been assigned, hence 3 dashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Assign the correct numbers to the below Linux permissions:

Read
Write
Execute

A

Read - 4
Write - 2
Execute - 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
How would you set permissions for owner, group and others for the below file so that each entity has the following permissions:
Owner: rwx
Group: r-x
Others: r--
File = privacy.docx
A

chmod 754 privacy.docx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What permissions does the following command set for the main Linux entities?
chmod 774 brexitbill.docx

A

Owner: rwx
Group: rwx
Others: r–

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the Windows file and folder permissions

A

Read
Read+Execute
Write
Modify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly