Network Access Control Lists (ACLs) Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which two types of compliance are laws?

  • FERPA and FISMA
  • HIPAA and FERPA
  • HIPAA and GLBA (correct)
  • GLBA and FISMA

Which cryptographic algorithm is obsolete?

  • SHA
  • DES
  • ECC
  • Caeser cipher (correct)

Which jurisdiction does the General Data Protection Regulation regulate?

  • Australia
  • United States
  • Canada
  • European Union (correct)

Which act regulates the United States Department of Education?

<p>FERPA (A)</p> Signup and view all the answers

Which act regulates federal departments in the United States?

<p>FISMA (A)</p> Signup and view all the answers

Which act regulates customer privacy in the finance industry?

<p>GLBA (C)</p> Signup and view all the answers

What is one of the three states of data?

<p>Data in use (B)</p> Signup and view all the answers

Which type of algorithm is a symmetric key?

<p>DES (C)</p> Signup and view all the answers

Which type of algorithm is an asymmetric key?

<p>ECC (C)</p> Signup and view all the answers

Which two types of algorithms are hashing algorithms?

<p>MD5 and SHA (B)</p> Signup and view all the answers

Which of the following best describes the permissions in a network access control list (ACL)?

<p>Permissions in network ACLs are binary, consisting of deny or allow. (A)</p> Signup and view all the answers

Which of the following best describes the types of access control lists (ACLs) commonly used?

<p>Access control lists are used to manage access to both files and directories, as well as network resources. (B)</p> Signup and view all the answers

Which form of access control uses CAPTCHAs?

<p>Attribute-based access control (D)</p> Signup and view all the answers

Which characteristic falls under accountability?

<p>Identity (C)</p> Signup and view all the answers

Which tool is used for vulnerability assessment?

<p>Qualys (D)</p> Signup and view all the answers

Which standards apply to any financial entity policies?

<p>Gramm-Leech-Bliley (GLB) (C)</p> Signup and view all the answers

What company audits other companies for licensing requirements?

<p>BSA (C)</p> Signup and view all the answers

Which term is synonymous with symmetric cryptography?

<p>Secret key cryptography (C)</p> Signup and view all the answers

Which term is synonymous with asymmetric cryptography?

<p>Public key cryptography (D)</p> Signup and view all the answers

What are hash functions used for?

<p>Determining whether the message has changed (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser