Test 2 Network Security Basics/Computer Security ITN 260/ADJ 157
physical
Locking the door(s) to the server room involves what kind of security?
RAID Zero
Which RAID level provides for no fault tolerance?
applications
These are not necessary to back up.
white box
"Full disclosure testing" is often referred to as this.
50 percent
Computer room humidity should ideally be kept above what percent?
National Security Agency
Government agency responsible for creating and breaking codes.
due care
Leaving a client's files on your desk where the cleaning staff could see and browse through them is a violation of this type of policy.
social engineering
Security attack that is the result of the trusting nature of human beings.
biometric
Security device that uses some biological characteristic of human beings to uniquely identify a person for authentication.
Internet Engineering Task Force I E T F
Tasked with developing standards for, and tries to improve, the Internet.
Security Zone
Term for an area in a building where access is individually monitored and controlled.
P K C S #5
The P K C S standard that is the standard for password-based cryptography.
H I P P A
The U.S. regulation which dictates the standards for storage, use, and transmission of personal medical information.
X.509
The X standard that defines certificate formats and fields for public keys.
attack surface
The area of an application that is available to users (those who are authenticated as well as those who are not) is known as what?
C A S T
The encryption algorithm which uses a 40 to 128-bit key and is used on many products from Microsoft to IBM.
Secure Hash Algorithm or S H A
The hashing algorithm which uses a 160-bit hash value.
Cryptographers
The individuals who specialize in the making of codes.
Brute Force
The method of code breaking which tries every possible combination of characters in an attempt to "guess" the password or key.
Hardening
The process of making a computing environment more secure from attacks and intruders is known as this.
Substitution cipher
The type of cryptographic method which replaces one character with another from a "match-up list" to produce the ciphertext.
Hot site
This is a backup location that can provide services within hours of complete system failure.
Hotfix
This is a repair made while the system is being repaired remains in operation.
System failure
This is an internal threat.
C E R T
This organization takes care of tracking and reporting of common computer and network security problems.
Denial of Service D o S
You are the administrator of a website. Suddenly web server & network utilization spikes to 100%. Users start reporting "Server not available" errors. You may have been the victim of what kind of attack?
limited distribution
An End User LIcense Agreement for software would be considered this type of classification of information.
Type C
Which fire extinguisher type is the best to be used on computer equipment in the case of a computer fire?
Back door
Which of the following is an attack where a program or service is placed on a server to bypass normal security procedures?
information classification policies
This type of policy determines if information is secret, top-secret or public.