CCT 069: CISSP Exam Questions - Data Collection, Location, and Destruction (D2.4)
Sep 07, 2023Imagine a world where a simple radio command halts an entire railway system. That's exactly what happened in Poland recently, and we're here to break down the intricate details of this cyber-attack. We'll reveal how the Polish radio stop command system was exploited, unraveling the mystery behind this major disruption. From there, we'll navigate the tricky waters of personal identifiable information (PII), data destruction, and data sovereignty, arming you with insights and strategies to protect your data. Ready to ace your CISSP exam? We've got your back with a series of exam-style questions and discussions around critical topics like data encryption and degausing a tape.
Switching gears, we'll venture into the realm of CCPA Compliance and data security. If you've been wondering how to determine the scope of consumer data, or puzzled over the features of GDPR, fret no more as we demystify these concepts. And let's not forget about the importance of secure data transmission, especially when dealing with financial data. We dive into the best practices for transmitting sensitive data, address API security, and explore secure data destruction methods. To cap off the episode, we'll tackle data scraping and the perils of unauthorized data collection. So, buckle up for an exhilarating ride through the landscape of cybersecurity!
Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
Question 1
Your organization stores customer PII. Which of the following should be implemented to ensure its protection?
A. Plain Text Storage
B. Database Encryption
C. Log File Monitoring
D. Intrusion Detection System
Answer: B. Database Encryption
Explanation: PII is sensitive data that needs to be encrypted during storage to protect against unauthorized access. While log file monitoring and intrusion detection systems are good for security, they do not specifically protect stored PII.
Question 2
You are responsible for data destruction. What should you do after degaussing a magnetic tape?
A. Validate that data is unreadable
B. Shred the tape
C. Overwrite data on the tape
D. Nothing; degaussing is sufficient
Answer: A. Validate that data is unreadable
Explanation: After degaussing, a validation step should be taken to ensure that the data is unreadable. Degaussing can sometimes be ineffective, so this step is crucial.
Question 3
A company operating globally is worried about data sovereignty. Which of the following is the BEST approach?
A. Storing all data in the cloud
B. Storing data in the country of origin
C. Encrypting all data
D. Data masking
Answer: B. Storing data in the country of origin
Explanation: Data sovereignty is about data being subject to the laws of the country it is located in. Storing data in the country of origin would ensure compliance with local laws.
Question 4
Which of the following is most appropriate for destroying SSDs?
A. Shredding
B. Degaussing
C. Secure Erase
D. Incineration
Answer: A. Shredding
Explanation: Degaussing is not effective for SSDs, and secure erase may not be sufficient. Physical destruction like shredding is often recommended for SSDs.
Question 5
What consent form is explicit and needs direct action from a user?
A. Opt-in
B. Opt-out
C. Passive consent
D. Active consent
Answer: A. Opt-in
Explanation: Opt-in consent requires an explicit action from a user, such as ticking a checkbox, making it an explicit form of consent.
Question 6
You are asked to ensure compliance with CCPA. What is one of the FIRST steps you should take?
A. Update privacy policies
B. Identify in-scope consumer data
C. Develop a mechanism for handling consumer requests
D. Appoint a Data Protection Officer (DPO)
Answer: B. Identify in-scope consumer data
Explanation: Before updating policies or developing mechanisms, you first need to identify what data is in scope for CCPA compliance.
Question 7
Which of the following regulatory standards is most relevant to healthcare data in the United States?
A. GDPR
B. CCPA
C. HIPAA
D. PCI DSS
Answer: C. HIPAA
Explanation: HIPAA specifically focuses on healthcare data protection in the United States.
Question 8
Which of the following is a key feature of GDPR?
A. Right to opt-out of data sale
B. Data portability
C. Mandatory two-factor authentication
D. Data masking
Answer: B. Data portability
Explanation: Data portability, which allows individuals to take their data from one service provider to another, is a key feature of GDPR.
Question 9
You've discovered an API collecting customer PII without proper security. What's your first action?
A. Disable the API
B. Implement OAuth
C. Notify customers
D. Update privacy policy
Answer: A. Disable the API
Explanation: The immediate action should be to disable the vulnerable API to prevent further data exposure.
Question 10
What is the best method for securely transmitting financial data over a network?
A. SSH
B. HTTPS
C. FTP
D. SFTP
Answer: B. HTTPS
Explanation: HTTPS provides secure, encrypted web communication, which is suitable for transmitting financial data.
Question 11
Your company collects data from users via online forms. What should you employ to prevent SQL injection?
A. Input Validation
B. Output Validation
C. CAPTCHA
D. Data Masking
Answer: A. Input Validation
Explanation: Input validation checks data for integrity before being processed, preventing SQL injection attacks.
Question 12
After securely erasing a hard drive, what should be the NEXT step?
A. Validation
B. Shredding
C. Degaussing
D. Incineration
Answer: A. Validation
Explanation: Validation should be performed to confirm that the data has been securely erased and is unrecoverable.
Question 13
Which destruction method involves deleting cryptographic keys?
A. Degaussing
B. Shredding
C. Cryptographic Shredding
D. Secure Erase
Answer: C. Cryptographic Shredding
Explanation: Cryptographic shredding involves the deletion of the cryptographic keys used to encrypt data, making it unreadable.
Question 14
What is data scraping?
A. User data input manually
B. Automatic gathering of data from websites
C. Manual copy-pasting of data from websites
D. Downloading a database
Answer: B. Automatic gathering of data from websites
Explanation: Data scraping refers to the automated methods of gathering data from websites.
Question 15
Which of the following is NOT an authorized data collection method?
A. User consent
B. Data scraping in violation of robots.txt
C. APIs
D. Direct input methods like forms
Answer: B. Data scraping in violation of robots.txt
Explanation: Scraping data in violation of robots.txt is not an authorized method of data collection.
Question 16
What is data sovereignty?
A. Data available globally
B. Data stored in the cloud
C. Data subject to the laws of the country it's located in
D. Data stored within a specific domain
Answer: C. Data subject to the laws of the country it's located in
Explanation: Data sovereignty refers to data being subject to the laws of the country where it is stored.
Question 17
What is the FIRST step in data lifecycle management?
A. Data creation
B. Data classification
C. Data storage
D. Data disposal
Answer: A. Data creation
Explanation: The data lifecycle starts with data creation, followed by other stages like classification, storage, and disposal.
Question 18
Which of the following is NOT a data destruction method?
A. Shredding
B. Logging
C. Degaussing
D. Incineration
Answer: B. Logging
Explanation: Logging is for monitoring and does not destroy data.
Question 19
Which of the following methods is NOT suitable for destroying paper records?
A. Shredding
B. Incineration
C. Degaussing
D. Pulping
Answer: C. Degaussing
Explanation: Degaussing is a method used to destroy data on magnetic storage media, not paper records.
Question 20
Which of the following is a requirement under CCPA?
A. Data localization
B. Right to be forgotten
C. Data masking
D. Mandatory encryption
Answer: B. Right to be forgotten
Explanation: CCPA includes a provision that allows California residents to request the deletion of their personal information, which is commonly referred to as the 'right to be forgotten'.
CISSP Cyber Training Academy Program!
Are you an ambitious Cybersecurity or IT professional who wants to take your career to a whole new level by achieving the CISSP Certification?
Let CISSP Cyber Training help you pass the CISSP Test the first time!
Studying for the CISSP and want to test your knowledge?
Look no further, you can have 360 CISSP Exam Questions for FREE!
Sign up and get the following:
-
60 Unique CISSP Exam Questions each month covering all 8 CISSP Domains for 6 months
-
Receive updated CISSP Exam Questions via email each week
-
Access to weekly podcasts that dive deep into a specific CISSP Domain and CISSP Exam Questions
-
Special promotions on my CISSP Products before they become available to the public
-
So much more…..
How can you refuse…it is all FREE, just for signing up!
What do you have to lose, you can unsubscribe at any time!
CISSP Cyber Training Academy Program!
Are you an ambitious Cybersecurity or IT professional who wants to take your career to a whole new level by achieving the CISSP Certification?
Let CISSP Cyber Training help you pass the CISSP Test the first time!

Have a Question about the CISSP or your cybersecurity career?
Click the link below and let me know what you are needing, and I can see how I can help!