Chapter 5 Flashcards

1
Q

Application Server

A

computer responsible for hosting applications to user workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Encryption

A

algorithm using one key to encrypt and different key to decrypt the input plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Checksum

A

digit representing the sum of the correct digits in a piece of stored or transmitted digital data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ciphertext

A

altered form of plaintext message so its unreadable for anyone except intended recipients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Configuration Management

A

process and discipline used to ensure only changes made to a system are those that have been authorized and validated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptography

A

study or applications of methods to secure or protect the meaning and content of messages, files, or other information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Loss Prevention (DLP)

A

system capabilities designed to detect and prevent unauthorized use and transmission of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Decryption

A

Reverse process of encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Degaussing

A

process of erasing data on disk or tape, when performed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Egress monitoring

A

Monitoring of outgoing network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Signature

A

provides the services of origin authentication, data integrity, and signer non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encryption

A

process of converting a message from plaintext to ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption System

A

Total set of algorithms, processes, hardware, software and procedures that provide encryption and decryption capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hardening

A

Process of applying secure configurations and locking down various hardware, communications systems, software, operating systems, web server, application server, application, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hash Function

A

algorithm that computes a numerical value on a data file or electronic message used to represent that file or message and depends on the entire contents of the file or message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hashing

A

process of using mathematical algorithm against data to product a numeric value that is representative of that data

17
Q

Ingress monitoring

A

monitoring of incoming network traffic

18
Q

Message digest

A

digital signature that uniquely identifies data and has the property such that changing a single bit in the data will cause a completely different digest to be generated

19
Q

Operating System

A

software “master control application” that runs the computer

20
Q

Patch

A

Software component, that, when installed, directly modified files or device settings related to a different software component without changing the version number or release details for related software component

21
Q

Patch Management

A

systematic notification, identification, deployment, installation, and verification of operating system and application software code revisions

22
Q

Plaintext

A

message or data in its natural format and in readable form, extremely vulnerable

23
Q

Records Retention

A

practice based on records lifecycle, according to which records are retained if necessary, and then destroyed after appropriate time interval has elapsed

24
Q

Remanence

A

residual information remaining on storage media after clearing

25
Q

Request for Change (RFC)

A

first stage in change management, where a change in procedure or product is sought by a stakeholder