Cybervista Flashcards
Risk Analysis based on opinions, ideas, and theories rather than calculations?
Qualitative Risk Analysis
First step in access controll process?
Identification
What elemant of Kerberos accepts the credentials of the user and creates the access ticket for the subject.
Key Distribution Center
How is a digital signature created?
By encrypting a hash with the senders private key
What are the four layers of the TCP/IP model?
1.Link
2.Internetworking
3. Host-to-Host
4. Process
What network device repackages packets to make their internal origin and make it seem as if they originated from this device instead.
Proxy
Which attack is often a DNS attack where attempts to resolve a FQDN result in receiving an invalid IP address?
Pharming
What connection technology is most often used to implement a storage area network (SAN)
Fibre Channel
What is the term for the rate at which an authorized user is falsely rejected by a biometric ?
False Rejection Rate (FRR)