Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
what is considered physical security?
|
Considers protecting your assets and information from unauthorized persons
|
|
What does operational security cover?
|
Covers computers, networks, and communications systems.
|
|
What do management and policies provide?
|
Provides guidance, rules, and procedures for implementing a security environment.
|
|
What do administrative policies cover?
|
Covers guidelines and expectations for upgrades, monitoring, backups, and audits.
|
|
What does DRP stand for?
|
Disaster recovery plan.
|
|
What does information policies cover?
|
Various aspects of information security, including access classifications, marking and storage, and the transmission and destruction of sensitive information.
|
|
What does security policies cover?
|
configuration of systems and networks, including the installation of software, hardware, and network connections.
|
|
what does usage policies cover?
|
How information and resources are used
|
|
What does user management policies cover?
|
The various actions that must occur in the normal course of employee activities.
|
|
What does access control define?
|
How users and systems communicate and in what manner.
|
|
What could MAC stand for?
|
Media access control, Mandatory access control, and Message authentication code.
|
|
What is Discretionary Access Control?
|
A model that allows the owner of a resource to establish privileges to the information they own.
|
|
What does ACL cover?
|
identifies the users who have authorization to access to certain information.
|
|
What could RBAC stand for?
|
Role-based access control, Rule-based access control.
|
|
What does biometrics use?
|
Physical characteristics to identify the user.
|
|
What does CHAP stand for?
|
Challenge Handshake Authentication Protocol.
|
|
When is authentication considered multi-factor?
|
When two or more access methods are included as part of the authentication process.
|
|
What is mutual authentication?
|
When two or more parties authenticate each other
|
|
What does PAP stand for?
|
Password Authentication Protocol.
|
|
What is a smart card?
|
A card that gives you access to resources.
|
|
What is the goal of confidentiality?
|
To prevent or minimize unauthorized access to and disclosure of data and information.
|
|
What is the goal of integrity?
|
Making sure that data being worked with is the correct data.
|
|
What is the goal of availability?
|
To protect data and prevent it's loss.
|
|
What are the four most common security zones?
|
Internet, Intranet, Extranet, and Demilitarized zone.
|
|
What does ISP stand for?
|
Internet Service Provider
|