Ahs 131 Test 4 Chapter 7-8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Full control (File permission)

(File permission) Lets you delete a file, as well as read (view) & write (edit)

Communicating double cylinder lock

(includes a keyed cylinder in both outside and inside knobs, and the key unlocks its own knob independently)

Passive RFID tags have ranges from about ____________

1/3 inch to 19 feet

prefix

10%

3DES employs a total of ____ iterations in its encryption.

48

Data Encryption Standard (DES) uses a key length of ____.

56 bits

ending suffix

90%

dynamic fingerprint scanner

A biometric reader that has a small slit or opening that requires the user to swipe a finger across the opening.

static fingerprint scanner

A biometric reader that requires the user to place her entire thumb or finger on a small oval window on the scanner and takes an optical "picture" of the fingerprint.

Class D Fire

Combustible metals

Class A fire

Common Combustibles such as paper, wood, furniture, clothing - Water, Foam

TKIP keys are known as _________ keys.

Per-packet

Fencing deterrants include the use of_______ which provide nonaggressive barrier at the top of the fence.

Roller barriers

Where is the best place to mount an AP?

The ceiling

Information Security

The term information security is frequently used to describe the tasks of securing information that is in a digital format.

Cleartext

The unencrypted form of data. Also known as plaintext

Class B Fire

flammable and combustible liquids

Owner

has total control over that object

Needed for fire

oxygen, heat, fuel, and chemical reaction

The top five most common passwords found were _____________, 123456, 12345678, qwerty, and abc123

password

VPN concentrator

A device that aggregates hundreds or thousands of VPN connections.

Steganography

A field within cryptography; uses images to hide data.

Key

A key is a mathematical value entered into the algorithm to produce ciphertext.

Encryption under WPA2 is accomplished by using

AES

An Order is tracked with a unique identifier (usually a number) and often referred to as an ___________________

Accession

____ is a symmetric cryptography algorithm that is currently used & is designed to be secure well into the future

Advanced Encryption Standard (AES)

A username serves to _____________ the user

Authenticate

__________ restrict access based on "what you are"

Biometrics

_________ encrypts the entire system volume, including the Windows Registry and any temporary files that might hold confidential information.

BitLocker

Live or energized electric wires or equipment cause Class _____ fires.

C

The _________ lock includes a keyed cylinder in both outside and inside knobs in the key unlocks its own not independently

Communicating double cylinder

PGP/GPG

Encryption software can be used to encrypt or decrypt files one by one. Most popular on windows

____________ the most common type of standard biometric device.

Fingerprints Scanners

Virus

First, it tries to reproduce itself by inserting its code into another file on the same computer. Second, it unloads a malicious payload and performs some action.

___________ is an open source product which provides software encryption.

GNU privacy guard

Data Closet

Have special cooling requirements

Store entry double cylinder locks

Include a keyed cylinder in both the outside and inside knobs so that a key in either knob locks or unlocks both at the same time.

Malware

Malware is software that enters a computer system without the user's knowl- edge or consent and then performs an unwanted—and usually harmful—action.

Telnet

One of the most widely used terminal emulation software.

A __________ Lock latches but does not lock a door.

Passage

Phishing

Phishing is sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering pri- vate information.

A ____________ a lock can lock the door but have access to a lot from the outside via small hole

Privacy

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

SSH

Secure Shell (SSH) is an encrypted alternative to the Telnet protocol that is used to access remote computers.

terminal emulation software

Software that allows a PC to act as a dumb terminal-an input/output device that enables the user to send commands to and view information on the host computer.

Retention Of Medical Records

The length of time for the retention of medical records may vary due to state regulations. In general, individual health care providers must retain a patient's LHR for seven years after the last treatment date, or three years from the patient's death.

Classroom locks

The outside can be locked or unlocked, and the inside lever is always unlocked.

storeroom locks

The outside is always locked, entry is by key only, and the inside lever is always unlocked.

Read & Execute Permission

The permission read and execute allows a user to list files and select a specific executable file to run it.

A ___________ uses an unsecured public network, such as the internet, as if it were a secure private network.

VPN

____________ uses RADIUS for authentication.

Wi-Fi Protected Access 2 (WPA2)

______ relies on a secret key that is shared between the wireless client device and the AP.

Wired Equivalent Privacy (WEP)

A _________ is a malicious program designed to take advantage of vulnerability in an application four operating system to enter a computer

Worm

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

Worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

RFID tag

an electronic identification device that is made up of a chip and antenna

Public key cryptography is also known as ____.

asymmetric cryptography

Cipher Lock

combination locks that use buttons that must be a pushed in the proper sequence to open the door

Class K Fire

cooking oils

Class C Fire

electrical

Social Engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

A ____ is used to encrypt cleartext data using an algorithm

key

How many passwords can pc generate

modern desktop computer can generate 1 million passwords per second.

Plaintext

normal text that has not been encrypted

Another name for symmetric cryptography is ____ cryptography.

private key

Spamming

unsolicited commercial e-mailing

Symmetric Cryptography

uses the same single key to encrypt and decrypt a document. (also called private key cryptography)


Set pelajaran terkait

Chapter 8 - Exploring Marine and Aviation Coverage

View Set

World Geography Chapter 5 Test Review

View Set

10 Real Estate Finance - Chapter 6: Predatory Lending and Mortgage Fraud

View Set

DECA Business Management Administration Test

View Set

PSY 302 Research Questions and Designs Module 5

View Set

Operations Management Exam 2: Chapter 8 (True or False)

View Set