• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/13

Click to flip

13 Cards in this Set

  • Front
  • Back
Name four major categories of data security.
Malicious Software, Unauthorized Access, System Failure and Social Engineering
Name six data security technologies?
Authentication, antimalware software, data backups, encryption, data removal, and user awareness
Name the three parts to Authentication.
1. Something the user knows
2. Something the user has
3. Something the user is
Name three common data removal options.
Clearing, purging, and destruction
Name six types of viruses.
Boot Sector, Macro, Program, Polymorphic, Stealth, and Multipartite
Name four types of encryption.
Symmetric key, asymmetric key, Encrypting File System (EFS), and BitLocker
What does EFS stand for?
Encrypting File System
In Symmeteric key encryption a common key is shared between which two parties?
The sender and the receiver
Give eight kinds of symmetric key encryption.
EFS, BitLocker, WEP, WPA, Kerberos, AES, 3DES, and Rivest Cipher
Name the two kinds of keys that asymmetric key encryption uses.
Public and private
Name two kinds of assymmetric key encryption.
RSA and ECC
Where can one access EFS?
Directly from the Properties page
What versions of Windows can BitLocker be used in?
Win 7/Vista Ultimate & Enterprise editions