Security Plus - Remember This

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

______________ ______________ help protect confidentiality by restricting access. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Location 2570). YCDA, LLC. Kindle Edition.

Access controls help protect confidentiality by restricting access.

______________________ ensures that systems are up and operational when needed and often addresses single points of failure. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Locations 2673-2674). YCDA, LLC. Kindle Edition.

Availability Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Location 2673). YCDA, LLC. Kindle Edition.

_______________________ ensures that data is only viewable by authorized users. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Locations 2568-2569). YCDA, LLC. Kindle Edition.

Confidentiality

______________ _________________ also provide authentication and non-repudiation. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Location 2642). YCDA, LLC. Kindle Edition.

Digital Signatures

______________ _________________ can verify the integrity of emails and files. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Locations 2641-2642). YCDA, LLC. Kindle Edition.

Digital Signatures

The best way to protect the confidentiality of data is by _________ it. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Location 2569). YCDA, LLC. Kindle Edition.

Encrypting

Provide an example of layered security

Firewall, IDS, content filtering, and antivirus software for example taken together represent layered security.

You can use _______ techniques to enforce integrity. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Location 2576). YCDA, LLC. Kindle Edition.

Hashing

There are times when unauthorized or unintended changes to data occur. This can be from unauthorized users, from malicious software (malware), and through system and human errors. When this occurs, the data has lost _________. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Locations 2573-2575). YCDA, LLC. Kindle Edition.

Integrity

______________ includes ensuring that no one has modified, tampered with, or corrupted the data. Ideally, only authorized users modify data. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Location 2573). YCDA, LLC. Kindle Edition.

Integrity

______________ provides assurances that data has not changed. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Locations 2572-2573). YCDA, LLC. Kindle Edition.

Integrity

______________ security, or defense in depth, combines multiple _____________ of security, such as a firewall, and IDS, content filtering, and antivirus software.

Layered layers

______________ _________________ ______________ addresses are the physical addresses assigned to network interface cards (NICs). Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Location 2593). YCDA, LLC. Kindle Edition.

Media access control (MAC)

______________ _________________ ______________ provides integrity similar to how a hash is used. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Location 2596). YCDA, LLC. Kindle Edition.

Message authentication code (MAC)

______________ is the likelihood that a threat will exploit a vulnerability. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Locations 2734-2735). YCDA, LLC. Kindle Edition.

Risk

_____________ ________________ reduces the chances that a threat will exploit a vulnerability, or reduces the impact of the risk, by implementing security controls. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Locations 2735-2736). YCDA, LLC. Kindle Edition.

Risk mitigation

______________________ helps provide confidentiality by hiding data, such as hiding text files within an image file. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Locations 2570-2571). YCDA, LLC. Kindle Edition.

Steganography

Hashing algorithms, such as MD5, HMAC, or SHA-1, calculate hashes to verify ___________________ Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Location 2618). YCDA, LLC. Kindle Edition.

integrity has been maintained.

The ___________________ ___________________ ________________ model is one of several access control models discussed in Chapter 2. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Locations 2594-2595). YCDA, LLC. Kindle Edition.

mandatory access control (MAC)

Exit doors with electronic locks typically fail in an open position so that personnel can exit _____________.

safely

Adding fencing and lighting around an organization's property provides ____________ for personnel and other assets. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Location 2697). YCDA, LLC. Kindle Edition.

safety

Adding stronger locks and door access systems increases ___________. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Locations 2697-2698). YCDA, LLC. Kindle Edition.

safety

Beyond confidentiality, integrity, and availability, _________ is another common goal of security. Gibson, Darril. CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide (Kindle Locations 2696-2697). YCDA, LLC. Kindle Edition.

safety


Kaugnay na mga set ng pag-aaral

Chapter 1: An Introduction to Cognitive Psychology

View Set

Nurs1020 Important Oxygenation Questions EAQ (Exam 2)

View Set

Project Management-TCM701 Midterm

View Set