chapter 23 Flashcards
CAC
Common Access Cards
EXIF
Exchangeable Image File
GPO
Group Policy Objects
IdP
Identity Provider
PIV
Personal Identity Verification
SAML
Security Assertion Markup Language
XMP
Extensible Metadata Platform
What is the purpose of an SSH key?
To be used for automated processes and services.
The process of transforming a description of a location, with coordinates, address, or name of place, into a location on the Earth’s surface.
Geocoding
Location-based marketing that uses GPS, RFID, WiFi or cell data to define a virtual geographical boundary around a certain or specific area.
Geolocation
The process of appending geographic coordinates to media based on the location of a mobile device.
Geotagging
The primary advantage of using time-of-day restrictions for access.
Prevents users from logging onto an enterprise network outside of regular business hours, limiting the risk of outside cyber-attacks.
The primary disadvantage of using time-of-day restrictions for access.
Someone that needs to log into their account will have no access outside of business hours.
What is the purpose of a token?
To identify specific access rights and authentication.
What is the purpose of a digital certificate?
To verify the identity of the sender/receiver of an electronic message and provide the means to encrypt/decrypt messages between sender and receiver.