Understanding Cybersecurity

Ace your homework & exams now with Quizwiz!

Nonrepudiation

A contractual stipulation to ensure that ebusiness participants do not deny their online actions

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

Business needs

Segmented network

Consists of two or more security zones

Outsourcing poses the greatest risk to an organization when it involves:

Core business functions

Which cybersecurity principle is most important when attempting to trace the source of malicious activity?

Nonrepudiation

Risk assessments should be performed:

On a regular basis

During which phase of the system development lifecycle (SDLC) should security first be considered?

Planning

A firewall that tracks open connection-oriented protocol sessions is said to be:

Stateful

Difference between stateful and stateless

Stateful firewalls are capable of monitoring and detecting states of all traffic on a network to track and defend based on traffic patterns and flows. Stateless firewalls, however, only focus on individual packets, using preset rules to filter traffic.

What is TKIP?

TKIP (Temporal Key Integrity Protocol) is an encryption protocol included as part of the IEEE 802.11i standard for wireless LANs (WLANs). It was designed to provide more secure encryption than the notoriously weak Wired Equivalent Privacy (WEP), the original WLAN security protocol.

SDLC

The software development lifecycle (SDLC) is the cost-effective and time-efficient process that development teams use to design and build high-quality software. The goal of SDLC is to minimize project risks through forward planning so that software meets customer expectations during production and beyond.

Who has the greatest influence over access security in a password authentication environment?

Users

Wireless Protected Access 2 (WPA2)

WPA2 ensures that data sent or received over your wireless network is encrypted, and only people with your network password have access to it. A benefit of the WPA2 system was that it introduced the Advanced Encryption System (AES) to replace the more vulnerable TKIP system used in the original WPA protocol

Which of the following offers the strongest protection for wireless network traffic?

Wireless Protected Access 2 (WPA2)


Related study sets

HSC3537 Hlth & Med Terminology Module 7

View Set

6.EE.5 - Solving Equations and Inequalities from a Set of Numbers

View Set

Anatomy and Physiology Study Guide: Autonomic Nervous System (Red Book)

View Set

Chapter 3: Describing Data: Numerical Measures

View Set

271-32-3 Using Equations And Powers Of Numbers

View Set

Unit 8: Explain the function of plot and structure. Quiz

View Set

Real Property - Restrictive Covenants

View Set

Nursing Management of Shock States

View Set