Secure Data destruction Flashcards

1
Q

What are the shredding security levels?

A

There are P2-P6, which P4 is the commercial level, then P5 = espionage proof, then P6 = DoD/NSA, military

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is pulping?

A

Same process as recycling and reduces documents to paper slurry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is overwriting?

A

Writing new data over deleted data, DoD 5220.22 data sanitization standard, which means three passes meaning overwriting with zeros then overwriting with binary zeros, then a random bit pattern overwrites it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is pulverizing?

A

media destruction of hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is degaussing?

A

Uses strong magnetics and scramble all the data to being unrecoverable and can be commercial grade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is incineration

A

complete destruction of all media compnents through incineration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Host security-Antivirus and Anti malware?

A

They run through signatures and definitions have behavior monitoring and also use Heuristic and AI do cloud based submissions and prefer to sandboxing vs quarantine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is EDR

A

Endpoint threat detections, and monitor endpoint behavior in real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data loss prevention and protection guide

A

protection of data in motion (VPN) and monitor and contorl data movement, do data classifiication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is host based intrusion detection

A

It is a passive software that monitors, detects and alerts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a host based preventation?

A

monitors, detects and alerts and then deploys countermeasures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Host based firewalls

A

It monitors the traffic on the host and use implicit deny if something isn’t on a list it wont be able to connect. They can monitor disk, memory and network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between host and network based

A

host based mean just that device is monitored and network based it monitors all of network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are NextGen firewalls

A

They use application inspection, SSL inspection, state awareness, and packet inspections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly