Mastering Access Control Lists (ACLs)
25 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which two types of compliance are laws? Choose two answers.

  • Regulatory and HIPAA
  • HIPAA and Gramm-Leech-Bliley (GLB)
  • Regulatory and Gramm-Leech-Bliley (GLB) (correct)
  • HIPAA and BSA
  • What are two common types of access control lists (ACLs)? Choose two answers.

  • Asymmetric and regulatory
  • Attribute-based and network (correct)
  • Attribute-based and secret key
  • Secret key and asymmetric
  • Which term is synonymous with symmetric cryptography?

  • Secret key cryptography (correct)
  • Asymmetric cryptography
  • Hash functions
  • Attribute-based access control
  • Which term is synonymous with asymmetric cryptography?

    <p>Asymmetric cryptography</p> Signup and view all the answers

    Which tool is used for vulnerability assessment?

    <p>Qualys</p> Signup and view all the answers

    What company audits other companies for licensing requirements?

    <p>BSA</p> Signup and view all the answers

    What are hash functions used for?

    <p>Verifying integrity of data</p> Signup and view all the answers

    Which form of access control uses CAPTCHAs?

    <p>Attribute-based access control</p> Signup and view all the answers

    Which characteristic falls under accountability?

    <p>Identity</p> Signup and view all the answers

    What is the disadvantage of logging?

    <p>Taking up storage space</p> Signup and view all the answers

    Which encryption method was named after Julius Caesar and is easily breakable?

    <p>Caesar cipher</p> Signup and view all the answers

    What jurisdiction does the General Data Protection Regulation (GDPR) regulate?

    <p>European Union</p> Signup and view all the answers

    Which act regulates the United States Department of Education?

    <p>FERPA</p> Signup and view all the answers

    Which act regulates federal departments in the United States?

    <p>FISMA</p> Signup and view all the answers

    Which act regulates customer privacy in the finance industry?

    <p>GLBA</p> Signup and view all the answers

    What are the three states of data?

    <p>Data in motion, Data at rest, Data in use</p> Signup and view all the answers

    Which type of algorithm is a symmetric key?

    <p>DES</p> Signup and view all the answers

    Which type of algorithm is an asymmetric key?

    <p>ECC</p> Signup and view all the answers

    Which two algorithms are hashing algorithms?

    <p>MD5 and SHA</p> Signup and view all the answers

    What term refers to the process of gathering and analyzing information to support business decisions?

    <p>Competitive intelligence</p> Signup and view all the answers

    What is the correct order of steps in the Operations Security Process?

    <ol> <li>Identification of critical information, 2) Analysis of threats, 3) Analysis of vulnerabilities, 4) Assessment of risks, 5) Application of countermeasures</li> </ol> Signup and view all the answers

    What does vulnerability analysis involve?

    <p>Identifying weaknesses that can cause harm</p> Signup and view all the answers

    What is considered the weakest link in a security program?

    <p>People</p> Signup and view all the answers

    Which social engineering technique uses electronic communications to carry out a broad attack?

    <p>Phishing</p> Signup and view all the answers

    Which law of operations security emphasizes the importance of identifying critical information?

    <p>Second law</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser