Mastering Access Control Lists (ACLs)
25 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which two types of compliance are laws? Choose two answers.

  • Regulatory and HIPAA
  • HIPAA and Gramm-Leech-Bliley (GLB)
  • Regulatory and Gramm-Leech-Bliley (GLB) (correct)
  • HIPAA and BSA

What are two common types of access control lists (ACLs)? Choose two answers.

  • Asymmetric and regulatory
  • Attribute-based and network (correct)
  • Attribute-based and secret key
  • Secret key and asymmetric

Which term is synonymous with symmetric cryptography?

  • Secret key cryptography (correct)
  • Asymmetric cryptography
  • Hash functions
  • Attribute-based access control

Which term is synonymous with asymmetric cryptography?

<p>Asymmetric cryptography (B)</p> Signup and view all the answers

Which tool is used for vulnerability assessment?

<p>Qualys (D)</p> Signup and view all the answers

What company audits other companies for licensing requirements?

<p>BSA (D)</p> Signup and view all the answers

What are hash functions used for?

<p>Verifying integrity of data (A)</p> Signup and view all the answers

Which form of access control uses CAPTCHAs?

<p>Attribute-based access control (A)</p> Signup and view all the answers

Which characteristic falls under accountability?

<p>Identity (B)</p> Signup and view all the answers

What is the disadvantage of logging?

<p>Taking up storage space (B)</p> Signup and view all the answers

Which encryption method was named after Julius Caesar and is easily breakable?

<p>Caesar cipher (A)</p> Signup and view all the answers

What jurisdiction does the General Data Protection Regulation (GDPR) regulate?

<p>European Union (B)</p> Signup and view all the answers

Which act regulates the United States Department of Education?

<p>FERPA (B)</p> Signup and view all the answers

Which act regulates federal departments in the United States?

<p>FISMA (A)</p> Signup and view all the answers

Which act regulates customer privacy in the finance industry?

<p>GLBA (A)</p> Signup and view all the answers

What are the three states of data?

<p>Data in motion, Data at rest, Data in use (D)</p> Signup and view all the answers

Which type of algorithm is a symmetric key?

<p>DES (C)</p> Signup and view all the answers

Which type of algorithm is an asymmetric key?

<p>ECC (A)</p> Signup and view all the answers

Which two algorithms are hashing algorithms?

<p>MD5 and SHA (B)</p> Signup and view all the answers

What term refers to the process of gathering and analyzing information to support business decisions?

<p>Competitive intelligence (D)</p> Signup and view all the answers

What is the correct order of steps in the Operations Security Process?

<ol> <li>Identification of critical information, 2) Analysis of threats, 3) Analysis of vulnerabilities, 4) Assessment of risks, 5) Application of countermeasures (D)</li> </ol> Signup and view all the answers

What does vulnerability analysis involve?

<p>Identifying weaknesses that can cause harm (A)</p> Signup and view all the answers

What is considered the weakest link in a security program?

<p>People (C)</p> Signup and view all the answers

Which social engineering technique uses electronic communications to carry out a broad attack?

<p>Phishing (B)</p> Signup and view all the answers

Which law of operations security emphasizes the importance of identifying critical information?

<p>Second law (A)</p> Signup and view all the answers

More Like This

Administrative Network Security
24 questions
IT Security Auditing and SOC Reports
30 questions
Use Quizgecko on...
Browser
Browser