Mastering Access Control Lists (ACLs)

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which two types of compliance are laws? Choose two answers.

  • Regulatory and HIPAA
  • HIPAA and Gramm-Leech-Bliley (GLB)
  • Regulatory and Gramm-Leech-Bliley (GLB) (correct)
  • HIPAA and BSA

What are two common types of access control lists (ACLs)? Choose two answers.

  • Asymmetric and regulatory
  • Attribute-based and network (correct)
  • Attribute-based and secret key
  • Secret key and asymmetric

Which term is synonymous with symmetric cryptography?

  • Secret key cryptography (correct)
  • Asymmetric cryptography
  • Hash functions
  • Attribute-based access control

Which term is synonymous with asymmetric cryptography?

<p>Asymmetric cryptography (B)</p> Signup and view all the answers

Which tool is used for vulnerability assessment?

<p>Qualys (D)</p> Signup and view all the answers

What company audits other companies for licensing requirements?

<p>BSA (D)</p> Signup and view all the answers

What are hash functions used for?

<p>Verifying integrity of data (A)</p> Signup and view all the answers

Which form of access control uses CAPTCHAs?

<p>Attribute-based access control (A)</p> Signup and view all the answers

Which characteristic falls under accountability?

<p>Identity (B)</p> Signup and view all the answers

What is the disadvantage of logging?

<p>Taking up storage space (B)</p> Signup and view all the answers

Which encryption method was named after Julius Caesar and is easily breakable?

<p>Caesar cipher (A)</p> Signup and view all the answers

What jurisdiction does the General Data Protection Regulation (GDPR) regulate?

<p>European Union (B)</p> Signup and view all the answers

Which act regulates the United States Department of Education?

<p>FERPA (B)</p> Signup and view all the answers

Which act regulates federal departments in the United States?

<p>FISMA (A)</p> Signup and view all the answers

Which act regulates customer privacy in the finance industry?

<p>GLBA (A)</p> Signup and view all the answers

What are the three states of data?

<p>Data in motion, Data at rest, Data in use (D)</p> Signup and view all the answers

Which type of algorithm is a symmetric key?

<p>DES (C)</p> Signup and view all the answers

Which type of algorithm is an asymmetric key?

<p>ECC (A)</p> Signup and view all the answers

Which two algorithms are hashing algorithms?

<p>MD5 and SHA (B)</p> Signup and view all the answers

What term refers to the process of gathering and analyzing information to support business decisions?

<p>Competitive intelligence (D)</p> Signup and view all the answers

What is the correct order of steps in the Operations Security Process?

<ol> <li>Identification of critical information, 2) Analysis of threats, 3) Analysis of vulnerabilities, 4) Assessment of risks, 5) Application of countermeasures (D)</li> </ol> Signup and view all the answers

What does vulnerability analysis involve?

<p>Identifying weaknesses that can cause harm (A)</p> Signup and view all the answers

What is considered the weakest link in a security program?

<p>People (C)</p> Signup and view all the answers

Which social engineering technique uses electronic communications to carry out a broad attack?

<p>Phishing (B)</p> Signup and view all the answers

Which law of operations security emphasizes the importance of identifying critical information?

<p>Second law (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Administrative Network Security
24 questions
IT Security Auditing and SOC Reports
30 questions
Use Quizgecko on...
Browser
Browser