Ch5 Terms Flashcards

1
Q

Encryption

A

Using mathematical algorithms to convert readable data into an unreadable form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Plaintext

A

Readable data, pre-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ciphertext

A

Unreadable data, post-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Stateful Packet Inspection

A

Firewalls ensure authorized data packets are received when requested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security is a shared responsibility between the ___ and ___.

A

CSP and Cloud Consumer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CIA Triad

A

Confidentiality, Availability, Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Symmetric Encryption

A

A Sender and Reciever use a single key to Encrypt and Decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Asymmetric Encryption

A

Uses a pair of keys, Public and Private. The Private Key is kept secret.
• Public Key to Encrypt
• Private Key to Decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital Signature

A

Validates the Authenticity and Integrity of a Digital Interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PKI

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CA

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN Tunnel

A

Securely extends an organization’s on-premise environment.
(Public Cloud to Hybrid Cloud)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tokenization

A

Random tokens are assigned to sensitive data to prevent its exposure. An Encrypted Token Vault Database stores the mapping between tokens and their original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VFA

A

Virtual Firewall Appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virtual Firewall Appliance

A

Performs Port / Service Filtering and Stateful Packet Inspection at the perimeter of the VPC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NACL

A

Network Access Control List

17
Q

Network ACL

A

Specifies Subnet Traffic Rules

18
Q

Security Groups

A

Control traffic between Individual Virtual Machines.

19
Q

Web Tier

A

Front End

20
Q

Database Tier

A

Back end

21
Q

IAM

A

Identity and Access Management

22
Q

Identity and Access Management

A

Authentication, Authorization, Accounting

23
Q

SSO

A

Single Sign On

24
Q

Federated Identity

A

Cloud Customers use their on-premesis credentials to access Cloud Services.