Term
What processe is a block cipher that processes blocks of 64 bits? |
|
Definition
|
|
Term
How many keys does Asymmetric encryption use and what are they called? |
|
Definition
Asymmetric uses two keys they are mathematically related and are known as public and private keys |
|
|
Term
What is GNU Privacy Guard(GPG)? |
|
Definition
It is an open source product |
|
|
Term
Microsoft's Encrypting File System(EFS) is a cryptography system for Windows operating system that uses what file system? |
|
Definition
|
|
Term
What does Microsoft Vista include to protect its data stored on the hard drive? |
|
Definition
|
|
Term
What are often issued from a Web server to a client although they can be disturbuted by any type of server, such as a mail server? |
|
Definition
Server Digital Certificates |
|
|
Term
In one type of trust model_________a relationship exists between two individuals because one person knows the other person |
|
Definition
|
|
Term
What does the hierarchical trust model assign a single hiearchy with one master CA called the _______? |
|
Definition
|
|
Term
What does the TLS Handshake Protocol allow? |
|
Definition
It allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted |
|
|
Term
SSh is actually a suite of three utilities_____________,that are secure versions of the unsecure UNIX counterparts utilities rlogin,rcp,and rsh |
|
Definition
|
|
Term
Another variation of PPP(Point-to-Point Protocol)that is used by broadband Internet providers with DSL or cable modem connections is ______________? |
|
Definition
Point-to-Point over Ethernet(PPPoE) |
|
|
Term
______________that do not harm people,documents, or electrical equipment in the room. |
|
Definition
|
|
Term
_________________ distributes parity data across all drives instead of using a separate drive to hold the parity error checking information |
|
Definition
|
|
Term
A________________ is generally run by a commerical disater recovery service that allows a business to continue computer and network operations to maintain business continuity |
|
Definition
|
|
Term
What is RTO (Recovery Time Objective) |
|
Definition
Is simply the length of time it will take to recover the data that has been backed up |
|
|
Term
A collection of requirements specfic to the system or procedure that must be met by everyone. |
|
Definition
|
|
Term
What determines the items that have a positive economic value and may include data,hardware,personnel,physical |
|
Definition
|
|
Term
What takes a snapshot of the security of the organization as it now stands |
|
Definition
|
|
Term
Defines requirements for storing and retrieving database usernames and passwords |
|
Definition
Database credentials coding policy |
|
|
Term
Helps employees determine what information sent or received by e-mail should be retained and for how long sent |
|
Definition
|
|
Term
Establishes requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the organization's network |
|
Definition
|
|
Term
A_____________is designed to produce a standardized framework for classifying information assets |
|
Definition
Classification of information Policy |
|
|
Term
_______________ refers to a methodology for making changes and keeping track of those changes often manually |
|
Definition
|
|
Term
________________ are values that are attributed to a system of beliefs that help the individual distinguish right from wrong |
|
Definition
|
|
Term
_____________relies on tricking and deceiving someone to provide secure information |
|
Definition
|
|