Shared Flashcard Set

Details

network security test
3rd test
25
Computer Networking
Graduate
10/28/2010

Additional Computer Networking Flashcards

 


 

Cards

Term
What processe is a block cipher that processes blocks of 64 bits?
Definition
RC2 (Rivest Cipher) 2
Term
How many keys does Asymmetric encryption use and what are they called?
Definition
Asymmetric uses two keys they are mathematically related and are known as public and private keys
Term
What is GNU Privacy Guard(GPG)?
Definition
It is an open source product
Term
Microsoft's Encrypting File System(EFS)
is a cryptography system for Windows operating system that uses what file system?
Definition
NTFS file system
Term
What does Microsoft Vista include to protect its data stored on the hard drive?
Definition
Bit Locker
Term
What are often issued from a Web server to a client although they can be disturbuted by any type of server, such as a mail server?
Definition
Server Digital Certificates
Term
In one type of trust model_________a relationship exists between two individuals because one person knows the other person
Definition
Direct Trust
Term
What does the hierarchical trust model assign a single hiearchy with one master CA called the _______?
Definition
Root
Term
What does the TLS Handshake Protocol allow?
Definition
It allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted
Term
SSh is actually a suite of three utilities_____________,that are secure versions of the unsecure UNIX counterparts utilities rlogin,rcp,and rsh
Definition
slogin,scp,and ssh
Term
Another variation of PPP(Point-to-Point Protocol)that is used by broadband Internet providers with DSL or cable modem connections is ______________?
Definition
Point-to-Point over Ethernet(PPPoE)
Term
______________that do not harm people,documents, or electrical equipment in the room.
Definition
Clean Agent System
Term
_________________ distributes parity data across all drives instead of using a separate drive to hold the parity error checking information
Definition
RAID LEVEL 5
Term
A________________ is generally run by a commerical disater recovery service that allows a business to continue computer and network operations to maintain business continuity
Definition
Hot Site
Term
What is RTO (Recovery Time Objective)
Definition
Is simply the length of time it will take to recover the data that has been backed up
Term
A collection of requirements specfic to the system or procedure that must be met by everyone.
Definition
Standard
Term
What determines the items that have a positive economic value and may include data,hardware,personnel,physical
Definition
Assets Identification
Term
What takes a snapshot of the security of the organization as it now stands
Definition
Vulnerability Appraisal
Term
Defines requirements for storing and retrieving database usernames and passwords
Definition
Database credentials coding policy
Term
Helps employees determine what information sent or received by e-mail should be retained and for how long sent
Definition
E-mail retention Policy
Term
Establishes requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the organization's network
Definition
VPN Security Policy
Term
A_____________is designed to produce a standardized framework for classifying information assets
Definition
Classification of information Policy
Term
_______________ refers to a methodology for making changes and keeping track of those changes often manually
Definition
Change Management
Term
________________ are values that are attributed to a system of beliefs that help the individual distinguish right from wrong
Definition
Morals
Term
_____________relies on tricking and deceiving someone to provide secure information
Definition
Social Engineering
Supporting users have an ad free experience!