08112017_NewHorizons Flashcards

1
Q

DAC keywords

A

Owner, DACL,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Labels are used for which access group

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Constrained Interface

A

interface that limits or restricts what users can do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CDI, Transformation Procedures, Integrity Verification are used in ….

A

Clark Wilson for Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This uses short path labels rather than longer network addresses. This high output throughput.

A

MPLS Multiprotocol Label Switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which one of the following is based on Blowfish and helps protect against rainbow table
attacks?

A

Bcrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When straightforward hashing is used to store passwords in a password fi le, attackers may use
_____ ______ of precomputed values to identify commonly used passwords. Adding
salts to the passwords before hashing them reduces the effectiveness of this attack.

A

rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ____ contains provisions prohibiting the circumvention of copyright protection mechanisms.

A

Digital Millennium Copyright Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How might you map out the organizational needs for transfer to or establishment in a new facility?

A

Critical path analysis can be defined as the logical sequencing of a series of events such that planners and integrators possess considerable information for the decision-making process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

________viruses use more than one propagation technique in an attempt to penetrate systems that defend against only one method or the other.

A

Multipartite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ , _______ and ______ are all vital procedures for ensuring effective and reliable security staffing because they verify the integrity and validate the suitability of said staffers.

A

Screening, bonding, and training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DHCP Port

A

68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly