Review Questions
Now it's time to check your knowledge. Answer these questions and check your answers, found in the Assessment section at the end of the book:
- What are the three components of the CIA triad?
- Why might a CCTV camera be situated outside a building without any film inside?
- What does confidentiality mean?
- How can we control access of personnel to a data center?
- What is the purpose of an air gap?
- Name three main control categories.
- Name three physical controls.
- Following an incident, what type of control will be used when researching how the incident happened?
- How do I know whether the integrity of my data is intact?
- What is a corrective control?
- What type of control is it when you change the firewall rules?
- What is used to log in to a system that works in conjunction with a PIN?
- What is the name of the person who looks after classified data and who is the person that gives people access to the classified data?
- When you use a DAC model for access, who determines who gains access to the data?
- What is least privilege?
- What is the Linux permission of 764? What access does it give you?
- The sales team are allowed to log in to the company system between 9 a.m. and 10 p.m. What type of access control is being used?
- Two people from the finance team are only allowed to authorize the payment of checks; what type of access control are they using?
- What is the purpose of the defense in depth model?
- When someone leaves the company, what is the first thing we should do with their user account?
- What do US companies that host websites in the US have to comply with if customers are based in Poland?
- How can a company discover that their suppliers are using inferior products?
- What is one of the most important factors between someone being arrested and their appearance before the judge in court?
- Can you explain what the purpose of the CLOUD Act and COPOA is?
- What is Stage C of Cloud Forensic Process 26?