DFT20083 Flashcards

1
Q

The best method to authenticate of user when he/she want to manage high level secret information

A

Biometrics Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Firewall only is enough to protect against large scale DDoS

A

WRONG (need to use large scale cloud based DDos protection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Use of port 80 in firewall

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Key function of firewall

A

Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fifth step in troubleshooting process

A

Verify full system functionality and implement preventive measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Most efficient encryption for authentication of user

A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption method that requires less computational power compared

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Most efficient encryption for large amounts of data

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of the common software used to protect yourself from MitM attacks

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Definition of SLA

A

A contract between a service provider and a customer on scope of the services to be provided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly