chapter 11

  1. What defines proper system usage or the rules of behavior for employees when using IT systems?
    Acceptable usage policy (AUP)
  2. What does NDA stand for?
    Non-disclosure agreement.
  3. What specifies technical and security requirements for planning, establishing, maintaining, and disconnecting a secure connection between two or more entities?
    Interconnection Security Agreement (ISA)
  4. What agreement expresses and understanding to work together toward a common goal?
    Memorandum of understanding (MOU) or memorandum of agreement (MOA).
  5. What is a BPA?
    A written agreement that details the relationship between business partners, including their obligations toward the partnership.
  6. what is a general sanitization term indicating that all sensitive data has been removed from a device?
    Purging
  7. what is file shredding?
    Soem applications remove all remnants of a file, they do so by repeatedly overwriting the space where the file is located with 1s and 0s.
  8. What refers to the process of completely removing all remnants of data on a disk?
    Wiping - A disk wiping tool might use a bit-level overwrite process.
  9. What is the special process that removes the random data stored at the end of a file?
    Cluster tip wiping
  10. What is an additional step taken after shredding paper to mash or puree the shredded paper?
    Pulping
  11. What is degaussing?
    A degauser is a very powerfulu electromagnetic tool. Passing a disk through a degausssing field renders the data on the tape and magnetic disk drives unreadable.
  12. What is the process of physically destroying media to sanitie it?
    Pulverizing
  13. What is a Data retention policy?
    It identifies how long data is retained, and sometimes specifies where it is stored.
  14. Which Act is known as the Financial Services Modernization act that includes a financial privacy rule that requires financial institutions to provide consumers with a privacy notice explaining what information is collected and how it is used?
    Gramm-Leach Bliley Act (GLBA)
  15. What Ac trequires that executives within an organization take individual responsibility for the accuracy of financial reports?
    Sarbanes-Oaxley Act
  16. Who is responsible for ensuring data is backed up in accordance with the backup policy and is labed correctly for storage?
    Steward/Custodian
  17. Who is primarily responsible for ensuring that the organization is complying with relevant laws?
    Privacy officer - usually an executive position within an organization
  18. What is an IRP?
    Incident response plan
  19. What refers to the order in whcih you should collect evidence?
    Order of Volatility
  20. What is the order of volatility?
    • Data in Cache Memory - including processor cache and hard drive cache
    • RAM
    • A Paging File on the system disk
    • Data stored on local disk drives
    • Logs stored on remote systems
    • Archive Media
  21. What is a distinct difference between standard system images and forensic images?
    Forensic images is an exact copy and does not modify the original. This si not always true with system imaging tools
Author
frk1xx7
ID
351078
Card Set
chapter 11
Description
chapter 11
Updated