implementing secure protocols and application Security Solutions

¡Supera tus tareas y exámenes ahora con Quizwiz!

what interface replace the Legacy BIOS on older system boards

UEFI

to facilitate signature validation DNSSEC and a few new DNS record types which record contains the hash of a DNSKEY record

DS

what tools are primarily focus on detecting and investigating suspicious activities and indicators of compromise (IOC's) on workstations laptops and mobile devices

EDR

which of these secure protocols would be used for synchronizing clocks on a network infrastructure device

NTPv3

which of these ipsec mechanisms are used for origin Authentication

RSA signatures

what is the type of hard drive that automatically and continuously encrypt the data on the drive without any user interaction

SED

what initiative defines a hierarchy of Security Management standards to secure data from theft and tampering by unauthorized persons who can access a storage device or whole system where the storage device resides

opal

what browser security policy forces the client to get another web page on a site from the same Source server

sop

what database security technique involves sending sensitive data through an API call to a provider that replaces the data with non-sensitive placeholders

tokenization


Conjuntos de estudio relacionados

ESS 106 - Living with Volcanoes: Mt St Helens 1

View Set

Chapter 47: Management of Patients With Gastric and Duodenal Disorders

View Set

fahmy 100 ( bible ) arabic & English 17

View Set

Chapter 16: Diagnosis/Problem Identification

View Set