Chapter 2 ■ Data Classification

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

User-Based

Which of the following is not a common method of data discovery?

2
New cards

Data Value

Sara is planning to implement data labeling for her organization. Which of the following is not a data label field that she should consider?

3
New cards

Language

Sarah is continuing her data labeling efforts and has received suggestions for appropriate data labels for data that will be used in multiple countries in which her company operates as part of ongoing security and data lifecycle efforts. Which of the following is not a label that would help with that usage?

4
New cards

Credentials

Asha wants to document the path that data takes from creation to storage in her institution’s database. As part of that effort, she creates a data flow diagram. Which of the following is not a common element of a data flow diagram?

5
New cards

Metadata

Mei wants to conduct data discovery activities in her organization. Which of the following types of data discovery is best suited for identifying all photos that were taken using a specific model of camera based on the original files generated by the camera?

6
New cards

Packet capture

Felix wants to monitor data transfers between two systems inside of his IaaS cloud–hosted data center. Which of the following audit mechanisms is unlikely to be available to him that is commonly available in on-­premises environments?

7
New cards

A data processor

Megan is documenting roles as part of the implementation of her organization’s data classification policy. Her organization uses a software as a service tool to accept applications from customers. What term best describes the SaaS vendor?

8
New cards

Legal hold

Jaime has been informed of legal action against his company and must now ensure that data relevant to the case is kept. What term describes this?

9
New cards

Transference

All policies within the organization should include a section that includes all of the following except ___________________.

10
New cards

Crypto-shredding

Melissa knows that many data destruction options are not available for data kept in thecloud due to how the services are architected using shared hardware and services. Which of the following is the best option for her organization to select for cloud-­hosted data that must be disposed of in a secure manner?

11
New cards

Copyrights

Which of the following is not a common data right controlled by an IRM system?

12
New cards

Structured data

Jason wants to properly describe the type of data his organization is using. He knows that the data is stored in a MySQL database. What type of data is Jason’s organization storing?

13
New cards

Data classification

Sensitivity, jurisdiction, and criticality might all be considered for what cloud data security activity?

14
New cards

Provisioning

Angela wants to provide users with access rights to files based on their roles. What capability of an IRM system most directly supports this requirement?

15
New cards

Data egress costs may be high

Nina’s company has stored unstructured data in an S3 bucket in AWS. She wants to perform data discovery on the data, but the discovery tool that she has requires the data to be local. What concern should Nina express about retrieving large volumes of data from a cloud service?

16
New cards

Jurisdiction and local laws may impact the ability to perform discovery

Tej wants to conduct data discovery across his organization’s databases; however, he knows that data is stored in multiple countries. What concern should he raise before the discovery process is conducted?

17
New cards

Periodic testing

Naomi has implemented a data archiving process as part of her organization’s cloud design. What important part of her archiving plan should she prioritize to ensure its long-­term success?

18
New cards

Certificate-based authentication and authorization

Yasine’s organization wants to enable systems to use data controlled by an IRM. What method is most commonly used to identify systems while allowing them to have their trust revoked if needed?

19
New cards

Semi-structured

Meena is conducting data discovery with data encoded in JSON. What type of data is she working with?

20
New cards

Crypto-shredding

Isaac wants to describe common information rights management (IRM) functions to his team. Which of the following is not a common IRM function?