• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

Which best practice configures host computers so that they are not vulnerable to attack?

Hardening configures systems such that they are protected from compromise.

Which type of test simulates a network attack?

Penetration tests simulate a network attack.

You have been asked to harden a crucial network router. What should you do? (Choose two.)

Changing the default passwords and applying patches are important steps inhardening a device.

You are invited to join an IT meeting where the merits and pitfalls of cloud computing arebeing debated. Your manager conveys her concerns of data confidentiality for cloud storage.What can be done to secure data stored in the cloud?

Encrypting data at rest protects the data from those not in possession of a decryptionkey.

Which of the following works best to encrypt variable-length data?

Stream ciphers encrypt data, usually a bit at a time, so this works well for data that isnot a fixed length.

With PKI, which key is used to validate a digital signature?

The public key of the signer is used to validate a digital signature.

Which of the following is related to nonrepudiation?

PKI is related to nonrepudiation, which means that a verified digital signature provesthe message came from the listed party. This is true because only the private key of the signingparty could have created the validated signature.

Sean configures a web application to allow content managers to upload files to the website.What type of access control model is Sean using?

Sean is using a role (content managers) to control who can upload files to the website.This is role-based access control (RBAC).

You are the administrator of a Windows network. When creating a new user account, youspecify a security clearance level of top secret so that the user can access classified files.What type of access control method is being used?

Mandatory access control (MAC) uses attributes (such as “top secret”) that enablecomputer systems to determine who should have access to what.

True or False. DAC is suitable for large organizations.

False. Discretionary access control (DAC) allows data owners, at their discretion, togrant permissions to users, but this is only viable with a small number of users.