Information Security and Availability (B6:M4) Flashcards

1
Q

what does a digital signature do?

A

ensures that the sender of a message is authentic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the general idea of asymmetric encryption?

A

a public key is used to encrypt the message; a private key is used to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what type of security policy describes information security and assigns responsibility for achievement of security objectives to the IT department?

A

program-level policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what do general controls do?

A

ensure that an organization’s control environment is well-managed and stable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what connects different kinds of networks?

A

gateways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what do routers do?

A

route packets of data through interconnected LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is the hierarchy of computer security policies?

A

program level policy

program-framework level policy

  • issue-specific
  • system-specific
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does a password have to be in order to be effective?

A

long (greater than 7 characters)

complex (uppercase, lowercase, numeric, !@# etc.)

changed every 90 days

not reused

two-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the steps in creating a disaster recovery plan?

A

assess risks

id mission critical applications

develop a plan

determine responsibilities of the personnel

test the plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the two types of partial backups?

A

incremental:
copying only data items that have changed since the last backup

differential:
copies all changes made since the last full backup

daily differential backups take more time than incremental backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hot site

cold site

warm site

A

fully equipped, backup copies of essential data at site, ready to take over data processing very quickly (most expensive)

has all electrical connections and other physical requirements for data processing, but no actual equipment

has all the required hardware, but no backup copies of essential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the difference between multifactor authentication and multimodal authentication?

A

multimodal uses multiple biometric data (fingerprint, face recognition, etc.)

multifactor would be like a traditional password and then a push sent to the person’s phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly