Cybervista Flashcards

1
Q

Risk Analysis based on opinions, ideas, and theories rather than calculations?

A

Qualitative Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

First step in access controll process?

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What elemant of Kerberos accepts the credentials of the user and creates the access ticket for the subject.

A

Key Distribution Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is a digital signature created?

A

By encrypting a hash with the senders private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four layers of the TCP/IP model?

A

1.Link
2.Internetworking
3. Host-to-Host
4. Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What network device repackages packets to make their internal origin and make it seem as if they originated from this device instead.

A

Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which attack is often a DNS attack where attempts to resolve a FQDN result in receiving an invalid IP address?

A

Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What connection technology is most often used to implement a storage area network (SAN)

A

Fibre Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the term for the rate at which an authorized user is falsely rejected by a biometric ?

A

False Rejection Rate (FRR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly