General Security 2 Flashcards

1
Q

What is Technical Change Mangement

A
  • Actual change management process
  • Performed by technical team
  • Concerned with “how” to change
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is PKI?

A
  • Public Key Infrastructure
  • System of hardware, software, policies and standarts that work together to manage, and distribute digital certificates and public keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Key Escrow?

A
  • Key storage management
  • By third party or within an organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which stored Data can be encrypted?

A
  • SSD
  • Hard Drive
  • USB Drive
  • Cloud Storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Full Disk and Volume Level Encryption?

A

Full Disk
* Encrypts entire contents of storage device

Volume level
* Encrypts specific volumes or partitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Programs are used in Windows and Mac to volume/partition?

A
  • Bit Locker
  • FileVault
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which program is used in Windows to encrypt single files?

A

EFS - Encrypting File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which ways are there to Encrypt Data from a Database?

A

Transparent Encryption
* Encrypts all data from a database
Record Level Encryption
* Encrypts individual columns
* Use of seperate symmetric keys for each column

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to transport Encryption?

A

Encrypting in the application
* Browsers can communicate using HTTPS

VPN (Virtual Private Network)
* Encrypts all data transmitted over the network,
regardless of the application
* Client-based VPN using SSL/TLS
* Site-to-site VPN using IPsec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to make encryption algorithms more secure?

A

Length of key

Key Stretching
* Perform encryption process multiple times
* Hash of Hash
* Brute Force attacks would need to decrypt all previous keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly