CompTIA+ Core 2 Part 6

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Incident Response

A set of procedures an investigator follows when examining a computer security incident

2
New cards

Incident Management Program

Consists of monitoring and detention of security events on a computer network and the use of proper responses to those security events

3
New cards

Chain of Custody

record of evidence history from collection to court presentation and disposal

4
New cards

Faraday Bag

Shields devices from outside signals to prevent data from being altered, deleted, or added to a new device

5
New cards

Legal Hold

Preserves all relevant information when litigation is reasonably expected to occur

6
New cards

Data Acquisition

Creates a forensically sound copy of the data from a source device

7
New cards

Order of Volatility

Collecting evidence that could be easily tampered or destroyed first

8
New cards

Digital Rights Management

Ensures copy protection for music and video that is being used in an online or digital manner

9
New cards

Public Data

No impact to the company if released and is often on a company’s website

10
New cards

Sensitive Data

Minimal impact if released and includes things like a company’s finances

11
New cards

Private Data

Contains information like personnel records, salaries, and other data only used in the organization

12
New cards

Confidential Data

Contains items such as trade secrets, intellectual property data, source code,  and things that would harm the company/ or government if disclosed

13
New cards

Unclassified

Can be released to the public under the Freedom of Information Act

14
New cards

Controlled Unclassified Information (CUI)

Includes unclassified information that should be protected from public disclosure

15
New cards

Secret Data

Includes data such as military deployment plans and other things that would damage national security if disclosed

16
New cards

Top Secret Data

 Includes blueprints for weapons or other information that could gravely damage national security if known by those unauthorized to know

17
New cards

Data Retention

Maintains and controls certain data to comply with business policies and applicable laws and regulations

18
New cards

Data Preservation

Keep information for a specific purpose outside of an organization’s data retention policy

19
New cards

Short-Term Retention

A term by how often the newest or youngest media sets are overwritten

20
New cards

Recovery Point Objective (RPO)

The maximum amount of time that can be lost from a recovery after a disaster, failure, or other event

21
New cards

Long-Term Retention

Any data moved to an archive to prevent being overwritten

22
New cards

Payment Card Industry Data Security Standard (PCI DSS)

is an agreement that organizations handling credit card information must follow.

23
New cards

Personally Identifiable Information (PII)

Any data that could potentially identify a specific individual

24
New cards


Personal Health Information (PHI)

is private details about an individual's health

25
New cards

Security policies

are rules and guidelines that define how to protect information and resources from unauthorized access or harm

26
New cards

Acceptable Use Policy (AUP)

Defines the rules that restrict how a computer, network, or other systems may be used

27
New cards

Change Management

Defines the structured way of changing the state of a computer system, network, or IT procedure

28
New cards

Separation of duties

means dividing tasks and responsibilities among different individuals to prevent conflicts of interest and enhance security.

29
New cards

Onboarding and Offboarding Policy

Dictates what type of things need to be done when an employee is hired, fired, or quits

30
New cards

Due Diligence

is making sure IT risks are identified and managed.

31
New cards

Due Care

is taking actions to defend against the risks found during due diligence.

32
New cards

Due Process

is a legal term about respecting and safeguarding personnel's rights

33
New cards

The four forms of regulated data covered by the exam are

PII (Personally Identifiable Information),

PCI (Payment Card Industry),

GDPR (General Data Protection Regulation)

PHI (Protected Health Information)

34
New cards

Enterprise license

like a business license, but for an unlimited number of users and is designed for large corporate and government networks.