Enterprise Security Flashcards

1
Q

cybersecurity process used to ensure the integrity of files, configurations, or system components within an IT environment.

A

Integrity Measurements check - Integrity verification or integrity monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

graphical representation or visualization of a computer network’s topology, architecture, and components. Network diagrams are used to illustrate the physical and logical connections between devices, systems, and infrastructure elements within an organization’s network.

A

Network Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refers to the concept that data is subject to the laws and regulations of the country or jurisdiction in which it is located or stored.

A

Data Sovereignty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These rules specify that if data is collected on EU citizens, that data must be stored in the European Union.

A

GDPR - General Data Protection Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Refers to the process of replacing sensitive or confidential information with fictitious or modified data to protect the original data from unauthorized access or disclosure.

A

Masking Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Characteristic of data encryption, means that the information that we are encrypting and putting into the cipher text is very different than what we originally started with the plaintext.

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Characteristic of data encryption. Means that if you change one piece of information in the plaintext, that the resulting cipher text is going to be dramatically different between these different versions.

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

refers to data that is stored or persisted in a storage medium, such as a hard drive, solid-state drive (SSD), database, or backup tape, and is not actively being transmitted or processed.

A

Data at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data that is moving across the network.

A

Data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Method used in cybersecurity and data protection to enhance the security of sensitive data by replacing it with a unique identifier called a token.

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly