Mastering Access Control Lists (ACLs)

LucrativeMagenta avatar
LucrativeMagenta
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

Which two types of compliance are laws? Choose two answers.

Regulatory and Gramm-Leech-Bliley (GLB)

What are two common types of access control lists (ACLs)? Choose two answers.

Attribute-based and network

Which term is synonymous with symmetric cryptography?

Secret key cryptography

Which term is synonymous with asymmetric cryptography?

<p>Asymmetric cryptography</p> Signup and view all the answers

Which tool is used for vulnerability assessment?

<p>Qualys</p> Signup and view all the answers

What company audits other companies for licensing requirements?

<p>BSA</p> Signup and view all the answers

What are hash functions used for?

<p>Verifying integrity of data</p> Signup and view all the answers

Which form of access control uses CAPTCHAs?

<p>Attribute-based access control</p> Signup and view all the answers

Which characteristic falls under accountability?

<p>Identity</p> Signup and view all the answers

What is the disadvantage of logging?

<p>Taking up storage space</p> Signup and view all the answers

Which encryption method was named after Julius Caesar and is easily breakable?

<p>Caesar cipher</p> Signup and view all the answers

What jurisdiction does the General Data Protection Regulation (GDPR) regulate?

<p>European Union</p> Signup and view all the answers

Which act regulates the United States Department of Education?

<p>FERPA</p> Signup and view all the answers

Which act regulates federal departments in the United States?

<p>FISMA</p> Signup and view all the answers

Which act regulates customer privacy in the finance industry?

<p>GLBA</p> Signup and view all the answers

What are the three states of data?

<p>Data in motion, Data at rest, Data in use</p> Signup and view all the answers

Which type of algorithm is a symmetric key?

<p>DES</p> Signup and view all the answers

Which type of algorithm is an asymmetric key?

<p>ECC</p> Signup and view all the answers

Which two algorithms are hashing algorithms?

<p>MD5 and SHA</p> Signup and view all the answers

What term refers to the process of gathering and analyzing information to support business decisions?

<p>Competitive intelligence</p> Signup and view all the answers

What is the correct order of steps in the Operations Security Process?

<ol> <li>Identification of critical information, 2) Analysis of threats, 3) Analysis of vulnerabilities, 4) Assessment of risks, 5) Application of countermeasures</li> </ol> Signup and view all the answers

What does vulnerability analysis involve?

<p>Identifying weaknesses that can cause harm</p> Signup and view all the answers

What is considered the weakest link in a security program?

<p>People</p> Signup and view all the answers

Which social engineering technique uses electronic communications to carry out a broad attack?

<p>Phishing</p> Signup and view all the answers

Which law of operations security emphasizes the importance of identifying critical information?

<p>Second law</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser