Term
| What processe is a block cipher that processes blocks of 64 bits? |
|
Definition
|
|
Term
| How many keys does Asymmetric encryption use and what are they called? |
|
Definition
| Asymmetric uses two keys they are mathematically related and are known as public and private keys |
|
|
Term
| What is GNU Privacy Guard(GPG)? |
|
Definition
| It is an open source product |
|
|
Term
Microsoft's Encrypting File System(EFS) is a cryptography system for Windows operating system that uses what file system? |
|
Definition
|
|
Term
| What does Microsoft Vista include to protect its data stored on the hard drive? |
|
Definition
|
|
Term
| What are often issued from a Web server to a client although they can be disturbuted by any type of server, such as a mail server? |
|
Definition
| Server Digital Certificates |
|
|
Term
| In one type of trust model_________a relationship exists between two individuals because one person knows the other person |
|
Definition
|
|
Term
| What does the hierarchical trust model assign a single hiearchy with one master CA called the _______? |
|
Definition
|
|
Term
| What does the TLS Handshake Protocol allow? |
|
Definition
| It allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted |
|
|
Term
| SSh is actually a suite of three utilities_____________,that are secure versions of the unsecure UNIX counterparts utilities rlogin,rcp,and rsh |
|
Definition
|
|
Term
| Another variation of PPP(Point-to-Point Protocol)that is used by broadband Internet providers with DSL or cable modem connections is ______________? |
|
Definition
| Point-to-Point over Ethernet(PPPoE) |
|
|
Term
| ______________that do not harm people,documents, or electrical equipment in the room. |
|
Definition
|
|
Term
| _________________ distributes parity data across all drives instead of using a separate drive to hold the parity error checking information |
|
Definition
|
|
Term
| A________________ is generally run by a commerical disater recovery service that allows a business to continue computer and network operations to maintain business continuity |
|
Definition
|
|
Term
| What is RTO (Recovery Time Objective) |
|
Definition
| Is simply the length of time it will take to recover the data that has been backed up |
|
|
Term
| A collection of requirements specfic to the system or procedure that must be met by everyone. |
|
Definition
|
|
Term
| What determines the items that have a positive economic value and may include data,hardware,personnel,physical |
|
Definition
|
|
Term
| What takes a snapshot of the security of the organization as it now stands |
|
Definition
|
|
Term
| Defines requirements for storing and retrieving database usernames and passwords |
|
Definition
| Database credentials coding policy |
|
|
Term
| Helps employees determine what information sent or received by e-mail should be retained and for how long sent |
|
Definition
|
|
Term
| Establishes requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the organization's network |
|
Definition
|
|
Term
| A_____________is designed to produce a standardized framework for classifying information assets |
|
Definition
| Classification of information Policy |
|
|
Term
| _______________ refers to a methodology for making changes and keeping track of those changes often manually |
|
Definition
|
|
Term
| ________________ are values that are attributed to a system of beliefs that help the individual distinguish right from wrong |
|
Definition
|
|
Term
| _____________relies on tricking and deceiving someone to provide secure information |
|
Definition
|
|