Ahs 131 Test 4 Chapter 7-8
Full control (File permission)
(File permission) Lets you delete a file, as well as read (view) & write (edit)
Communicating double cylinder lock
(includes a keyed cylinder in both outside and inside knobs, and the key unlocks its own knob independently)
Passive RFID tags have ranges from about ____________
1/3 inch to 19 feet
prefix
10%
3DES employs a total of ____ iterations in its encryption.
48
Data Encryption Standard (DES) uses a key length of ____.
56 bits
ending suffix
90%
dynamic fingerprint scanner
A biometric reader that has a small slit or opening that requires the user to swipe a finger across the opening.
static fingerprint scanner
A biometric reader that requires the user to place her entire thumb or finger on a small oval window on the scanner and takes an optical "picture" of the fingerprint.
Class D Fire
Combustible metals
Class A fire
Common Combustibles such as paper, wood, furniture, clothing - Water, Foam
TKIP keys are known as _________ keys.
Per-packet
Fencing deterrants include the use of_______ which provide nonaggressive barrier at the top of the fence.
Roller barriers
Where is the best place to mount an AP?
The ceiling
Information Security
The term information security is frequently used to describe the tasks of securing information that is in a digital format.
Cleartext
The unencrypted form of data. Also known as plaintext
Class B Fire
flammable and combustible liquids
Owner
has total control over that object
Needed for fire
oxygen, heat, fuel, and chemical reaction
The top five most common passwords found were _____________, 123456, 12345678, qwerty, and abc123
password
VPN concentrator
A device that aggregates hundreds or thousands of VPN connections.
Steganography
A field within cryptography; uses images to hide data.
Key
A key is a mathematical value entered into the algorithm to produce ciphertext.
Encryption under WPA2 is accomplished by using
AES
An Order is tracked with a unique identifier (usually a number) and often referred to as an ___________________
Accession
____ is a symmetric cryptography algorithm that is currently used & is designed to be secure well into the future
Advanced Encryption Standard (AES)
A username serves to _____________ the user
Authenticate
__________ restrict access based on "what you are"
Biometrics
_________ encrypts the entire system volume, including the Windows Registry and any temporary files that might hold confidential information.
BitLocker
Live or energized electric wires or equipment cause Class _____ fires.
C
The _________ lock includes a keyed cylinder in both outside and inside knobs in the key unlocks its own not independently
Communicating double cylinder
PGP/GPG
Encryption software can be used to encrypt or decrypt files one by one. Most popular on windows
____________ the most common type of standard biometric device.
Fingerprints Scanners
Virus
First, it tries to reproduce itself by inserting its code into another file on the same computer. Second, it unloads a malicious payload and performs some action.
___________ is an open source product which provides software encryption.
GNU privacy guard
Data Closet
Have special cooling requirements
Store entry double cylinder locks
Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time.
Malware
Malware is software that enters a computer system without the user's knowl- edge or consent and then performs an unwanted—and usually harmful—action.
Telnet
One of the most widely used terminal emulation software.
A __________ Lock latches but does not lock a door.
Passage
Phishing
Phishing is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering pri- vate information.
A ____________ a lock can lock the door but have access to a lot from the outside via small hole
Privacy
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
SSH
Secure Shell (SSH) is an encrypted alternative to the Telnet protocol that is used to access remote computers.
terminal emulation software
Software that allows a PC to act as a dumb terminal-an input/output device that enables the user to send commands to and view information on the host computer.
Retention Of Medical Records
The length of time for the retention of medical records may vary due to state regulations. In general, individual health care providers must retain a patient's LHR for seven years after the last treatment date, or three years from the patient's death.
Classroom locks
The outside can be locked or unlocked, and the inside lever is always unlocked.
storeroom locks
The outside is always locked, entry is by key only, and the inside lever is always unlocked.
Read & Execute Permission
The permission read and execute allows a user to list files and select a specific executable file to run it.
A ___________ uses an unsecured public network, such as the internet, as if it were a secure private network.
VPN
____________ uses RADIUS for authentication.
Wi-Fi Protected Access 2 (WPA2)
______ relies on a secret key that is shared between the wireless client device and the AP.
Wired Equivalent Privacy (WEP)
A _________ is a malicious program designed to take advantage of vulnerability in an application four operating system to enter a computer
Worm
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
Worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
RFID tag
an electronic identification device that is made up of a chip and antenna
Public key cryptography is also known as ____.
asymmetric cryptography
Cipher Lock
combination locks that use buttons that must be a pushed in the proper sequence to open the door
Class K Fire
cooking oils
Class C Fire
electrical
Social Engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information
A ____ is used to encrypt cleartext data using an algorithm
key
How many passwords can pc generate
modern desktop computer can generate 1 million passwords per second.
Plaintext
normal text that has not been encrypted
Another name for symmetric cryptography is ____ cryptography.
private key
Spamming
unsolicited commercial e-mailing
Symmetric Cryptography
uses the same single key to encrypt and decrypt a document. (also called private key cryptography)