Test 2 Network Security Basics/Computer Security ITN 260/ADJ 157

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

physical

Locking the door(s) to the server room involves what kind of security?

RAID Zero

Which RAID level provides for no fault tolerance?

applications

These are not necessary to back up.

white box

"Full disclosure testing" is often referred to as this.

50 percent

Computer room humidity should ideally be kept above what percent?

National Security Agency

Government agency responsible for creating and breaking codes.

due care

Leaving a client's files on your desk where the cleaning staff could see and browse through them is a violation of this type of policy.

social engineering

Security attack that is the result of the trusting nature of human beings.

biometric

Security device that uses some biological characteristic of human beings to uniquely identify a person for authentication.

Internet Engineering Task Force I E T F

Tasked with developing standards for, and tries to improve, the Internet.

Security Zone

Term for an area in a building where access is individually monitored and controlled.

P K C S #5

The P K C S standard that is the standard for password-based cryptography.

H I P P A

The U.S. regulation which dictates the standards for storage, use, and transmission of personal medical information.

X.509

The X standard that defines certificate formats and fields for public keys.

attack surface

The area of an application that is available to users (those who are authenticated as well as those who are not) is known as what?

C A S T

The encryption algorithm which uses a 40 to 128-bit key and is used on many products from Microsoft to IBM.

Secure Hash Algorithm or S H A

The hashing algorithm which uses a 160-bit hash value.

Cryptographers

The individuals who specialize in the making of codes.

Brute Force

The method of code breaking which tries every possible combination of characters in an attempt to "guess" the password or key.

Hardening

The process of making a computing environment more secure from attacks and intruders is known as this.

Substitution cipher

The type of cryptographic method which replaces one character with another from a "match-up list" to produce the ciphertext.

Hot site

This is a backup location that can provide services within hours of complete system failure.

Hotfix

This is a repair made while the system is being repaired remains in operation.

System failure

This is an internal threat.

C E R T

This organization takes care of tracking and reporting of common computer and network security problems.

Denial of Service D o S

You are the administrator of a website. Suddenly web server & network utilization spikes to 100%. Users start reporting "Server not available" errors. You may have been the victim of what kind of attack?

limited distribution

An End User LIcense Agreement for software would be considered this type of classification of information.

Type C

Which fire extinguisher type is the best to be used on computer equipment in the case of a computer fire?

Back door

Which of the following is an attack where a program or service is placed on a server to bypass normal security procedures?

information classification policies

This type of policy determines if information is secret, top-secret or public.


Set pelajaran terkait

Ch. 2 Information for Test- Physics

View Set

AC Systems, Level 1 - 3rd Ed. Lesson 3

View Set

Government Summative Review 3 and 4

View Set

Pharmacology - The Point missed questions

View Set