Exam #1 Flashcards

1
Q

Confidentiality

A

Only authorized individuals can access confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Information remains accurate and complete, has not been tampered with or modified in any way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Authorized users have timely and reliable access to information and systems when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of Confidentiality

A

Access control lists (ACL), encryption, data masking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of Integrity

A

Checksums, hashing, digital signatures, versioning systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of Availability

A

Disaster recovery plans, redundancy, performance monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital forensics

A

The application of scientific principles to provide assurance in what has and has not happened on a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authenticating people

A

Verifying identity to ensure they are who they say they are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authenticating systems

A

Verifying the identity of a device, computer, or applications to ensure it is authorized to access resources or communicate with other systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authorization models

A

Define the rules and policies of who can access specific resources and perform specific actions within a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Examples of authorization models

A

ACL, RBAC, ABAC, RuBAC, MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rainbow Table

A

A precalculated series of hashes using known algorithms commonly used for cracking passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hash

A
  • One-way algorithm
  • Application-specific
  • Fixed size
  • Chain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Accounting

A

Tracking user activities for audit and security purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly