DFT20083 Flashcards
The best method to authenticate of user when he/she want to manage high level secret information
Biometrics Identification
Firewall only is enough to protect against large scale DDoS
WRONG (need to use large scale cloud based DDos protection)
Use of port 80 in firewall
HTTP
Key function of firewall
Monitoring
Fifth step in troubleshooting process
Verify full system functionality and implement preventive measures
Most efficient encryption for authentication of user
Asymmetric Encryption
Encryption method that requires less computational power compared
Symmetric Encryption
Most efficient encryption for large amounts of data
Symmetric Encryption
One of the common software used to protect yourself from MitM attacks
VPN
Definition of SLA
A contract between a service provider and a customer on scope of the services to be provided