Bash, the Crucial Exams Chat Bot
AI Bot

Security, Privacy, and Compliance in Data  Flashcards

CompTIA DataX DY0-001 (V1) Flashcards

FrontBack
Define data anonymizationThe process of removing or encrypting identifiable information from datasets
Define data maskingA technique to obscure data, making it inaccessible to unauthorized users
Define endpoint securityMeasures taken to secure devices connected to a network, such as laptops or mobile phones
Define security patchesUpdates to software fixing vulnerabilities or improving security
Name one common privacy lawGDPR or CCPA
What are cookies in the context of privacySmall text files that websites store on users' devices to track browsing activity
What are the penalties for violating GDPRFines up to €20 million or 4% of annual global turnover
What does "data retention policy" meanGuidelines for how long data should be stored before deletion
What does GDPR stand forGeneral Data Protection Regulation
What does HIPAA regulateHealth Insurance Portability and Accountability Act, focused on securing healthcare data
What is a data breachAn incident where sensitive data is accessed or disclosed without authorization
What is an intrusion detection system (IDS)A tool or software designed to detect unauthorized access or threats to a network
What is backup and recovery in data securityStoring copies of data to restore it after accidental loss or breaches
What is CCPACalifornia Consumer Privacy Act, a privacy law in California to protect consumer data
What is compliance in context of data securityAdhering to laws, regulations, and standards governing data use and protection
What is data encryptionThe process of converting data into a coded format to prevent unauthorized access
What is multi-factor authentication (MFA)Using two or more verification methods to enhance login security
What is phishingA fraudulent attempt to obtain sensitive information by impersonating a trustworthy entity
What is PIIPersonally Identifiable Information used to identify an individual
What is ransomwareMalicious software that locks or encrypts data until a ransom is paid
What is the CIA triad in data securityConfidentiality, Integrity, Availability
What is the function of role-based access controlAssigning user permissions based on their role in an organization
What is the principle of least privilegeGiving users the minimum access necessary to perform their tasks
What is the purpose of audit logsTracking and recording user activities for accountability and review
What is the purpose of firewallsTo block unauthorized access to networks while permitting legitimate communication
What is the role of a Data Protection Officer (DPO)Ensuring compliance with data privacy laws within an organization
What is two-factor authentication (2FA)A security process requiring users to verify their identity using two different methods
Why is data classification importantTo categorize data based on its sensitivity and set appropriate protection levels
This deck addresses data security concepts, privacy laws, and compliance requirements key to managing sensitive data responsibly.
Share on...
Follow us on...