Understanding Cybersecurity
Nonrepudiation
A contractual stipulation to ensure that ebusiness participants do not deny their online actions
Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:
Business needs
Segmented network
Consists of two or more security zones
Outsourcing poses the greatest risk to an organization when it involves:
Core business functions
Which cybersecurity principle is most important when attempting to trace the source of malicious activity?
Nonrepudiation
Risk assessments should be performed:
On a regular basis
During which phase of the system development lifecycle (SDLC) should security first be considered?
Planning
A firewall that tracks open connection-oriented protocol sessions is said to be:
Stateful
Difference between stateful and stateless
Stateful firewalls are capable of monitoring and detecting states of all traffic on a network to track and defend based on traffic patterns and flows. Stateless firewalls, however, only focus on individual packets, using preset rules to filter traffic.
What is TKIP?
TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs (WLANs). It was designed to provide more secure encryption than the notoriously weak Wired Equivalent Privacy (WEP), the original WLAN security protocol.
SDLC
The software development lifecycle (SDLC) is the cost-effective and time-efficient process that development teams use to design and build high-quality software. The goal of SDLC is to minimize project risks through forward planning so that software meets customer expectations during production and beyond.
Who has the greatest influence over access security in a password authentication environment?
Users
Wireless Protected Access 2 (WPA2)
WPA2 ensures that data sent or received over your wireless network is encrypted, and only people with your network password have access to it. A benefit of the WPA2 system was that it introduced the Advanced Encryption System (AES) to replace the more vulnerable TKIP system used in the original WPA protocol
Which of the following offers the strongest protection for wireless network traffic?
Wireless Protected Access 2 (WPA2)