• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
Name four major categories of data security.
Malicious Software, Unauthorized Access, System Failure and Social Engineering
Name six data security technologies?
Authentication, antimalware software, data backups, encryption, data removal, and user awareness
Name the three parts to Authentication.
1. Something the user knows
2. Something the user has
3. Something the user is
Name three common data removal options.
Clearing, purging, and destruction
Name six types of viruses.
Boot Sector, Macro, Program, Polymorphic, Stealth, and Multipartite
Name four types of encryption.
Symmetric key, asymmetric key, Encrypting File System (EFS), and BitLocker
What does EFS stand for?
Encrypting File System
In Symmeteric key encryption a common key is shared between which two parties?
The sender and the receiver
Give eight kinds of symmetric key encryption.
EFS, BitLocker, WEP, WPA, Kerberos, AES, 3DES, and Rivest Cipher
Name the two kinds of keys that asymmetric key encryption uses.
Public and private
Name two kinds of assymmetric key encryption.
RSA and ECC
Where can one access EFS?
Directly from the Properties page
What versions of Windows can BitLocker be used in?
Win 7/Vista Ultimate & Enterprise editions