Network Access Control Lists (ACLs) Quiz
20 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which two types of compliance are laws?

  • FERPA and FISMA
  • HIPAA and FERPA
  • HIPAA and GLBA (correct)
  • GLBA and FISMA
  • Which cryptographic algorithm is obsolete?

  • SHA
  • DES
  • ECC
  • Caeser cipher (correct)
  • Which jurisdiction does the General Data Protection Regulation regulate?

  • Australia
  • United States
  • Canada
  • European Union (correct)
  • Which act regulates the United States Department of Education?

    <p>FERPA</p> Signup and view all the answers

    Which act regulates federal departments in the United States?

    <p>FISMA</p> Signup and view all the answers

    Which act regulates customer privacy in the finance industry?

    <p>GLBA</p> Signup and view all the answers

    What is one of the three states of data?

    <p>Data in use</p> Signup and view all the answers

    Which type of algorithm is a symmetric key?

    <p>DES</p> Signup and view all the answers

    Which type of algorithm is an asymmetric key?

    <p>ECC</p> Signup and view all the answers

    Which two types of algorithms are hashing algorithms?

    <p>MD5 and SHA</p> Signup and view all the answers

    Which of the following best describes the permissions in a network access control list (ACL)?

    <p>Permissions in network ACLs are binary, consisting of deny or allow.</p> Signup and view all the answers

    Which of the following best describes the types of access control lists (ACLs) commonly used?

    <p>Access control lists are used to manage access to both files and directories, as well as network resources.</p> Signup and view all the answers

    Which form of access control uses CAPTCHAs?

    <p>Attribute-based access control</p> Signup and view all the answers

    Which characteristic falls under accountability?

    <p>Identity</p> Signup and view all the answers

    Which tool is used for vulnerability assessment?

    <p>Qualys</p> Signup and view all the answers

    Which standards apply to any financial entity policies?

    <p>Gramm-Leech-Bliley (GLB)</p> Signup and view all the answers

    What company audits other companies for licensing requirements?

    <p>BSA</p> Signup and view all the answers

    Which term is synonymous with symmetric cryptography?

    <p>Secret key cryptography</p> Signup and view all the answers

    Which term is synonymous with asymmetric cryptography?

    <p>Public key cryptography</p> Signup and view all the answers

    What are hash functions used for?

    <p>Determining whether the message has changed</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser