• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back
what is considered physical security?
Considers protecting your assets and information from unauthorized persons
What does operational security cover?
Covers computers, networks, and communications systems.
What do management and policies provide?
Provides guidance, rules, and procedures for implementing a security environment.
What do administrative policies cover?
Covers guidelines and expectations for upgrades, monitoring, backups, and audits.
What does DRP stand for?
Disaster recovery plan.
What does information policies cover?
Various aspects of information security, including access classifications, marking and storage, and the transmission and destruction of sensitive information.
What does security policies cover?
configuration of systems and networks, including the installation of software, hardware, and network connections.
what does usage policies cover?
How information and resources are used
What does user management policies cover?
The various actions that must occur in the normal course of employee activities.
What does access control define?
How users and systems communicate and in what manner.
What could MAC stand for?
Media access control, Mandatory access control, and Message authentication code.
What is Discretionary Access Control?
A model that allows the owner of a resource to establish privileges to the information they own.
What does ACL cover?
identifies the users who have authorization to access to certain information.
What could RBAC stand for?
Role-based access control, Rule-based access control.
What does biometrics use?
Physical characteristics to identify the user.
What does CHAP stand for?
Challenge Handshake Authentication Protocol.
When is authentication considered multi-factor?
When two or more access methods are included as part of the authentication process.
What is mutual authentication?
When two or more parties authenticate each other
What does PAP stand for?
Password Authentication Protocol.
What is a smart card?
A card that gives you access to resources.
What is the goal of confidentiality?
To prevent or minimize unauthorized access to and disclosure of data and information.
What is the goal of integrity?
Making sure that data being worked with is the correct data.
What is the goal of availability?
To protect data and prevent it's loss.
What are the four most common security zones?
Internet, Intranet, Extranet, and Demilitarized zone.
What does ISP stand for?
Internet Service Provider