Data Controls Flashcards

1
Q

A ___ ___ uses public/private key encryption technology to provide a means of authenticating messages delivered in a networked environment.

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The encryption technology itself is designed to provide ___, not ____.

A

security; authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ___ ___ is designed to detect errors in data transmission.

A

parity check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ___ ___ is an example of a check digit. A 0 or 1 included in a byte of information which makes the sum of bits either odd or even.

A

parity check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

“smart cards” that contain additional user identification information and must be read by an input device are an example of a ___ ___.

A

security tokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

devices which provide “one-time” passwords that must be input by the user are an example of a ___ ___.

A

security token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ ___ ___ ___ are the use of several separate authentication procedures at one time (e.g., user name, password, one-time password and fingerprint)

A

multi-factor authentication procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ authentication procedures significantly enhance the authentication process.

A

Redundant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What purpose do echo checks serve?

A

They verify that transmission between devices is accurate by “echoing back” the received transmission from the receiving device to the sending unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What purpose do read-after-write checks serve?

A

They verify that data was written correctly to disk by reading what was just written and comparing it to the source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are “one-time” passwords used by an organization and how do these passwords work?

A

Used to strengthen the standard password by requiring access to a physical device which displays a new “one-time password” every 30-60 seconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Deceptive requests for information delivered via email is called ___.

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ ___ are program utilities that check the internal operations of hardware components.

A

diagnostic routines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What purpose do logical access controls serve?

A

control electronic access to data via internal and external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Controls built into the computer equipment to ensure that data is transmitted and processed accurately are called ___ ___

A

hardware controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly