module 8 Flashcards

1
Q

is a method for confirming the identity of a computer user. Authentication can be done with passwords, tokens or biometrics. More robust authentication involves two-factor authentication and multi-factor authentication.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is the process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space.

A

Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

four most common access control models

A

mandatory
discretionary
role based
rule based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

used by administraters to help organize and streamline the process of managing access.

A

four common access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is a mechanism to ensure that individuals cannot deny their actions.

A

non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

occurs when organizations use software that filters content to prevent the accidental or malicious transmission of unauthroized information.

A

content filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

scrambles cleartext information into an alternate form (cyphertext) that requires a key or password to decrypt.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

are hardware and/or software that guards a private network by analyzing incoming and outgoing information for the correct markings.

A

firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

involves full-time monitoring tools that search for patterns in network traffic to identify intruders. IDS was cutting edge a decade ago, but has now evolved into Intrustion Detection and Prevention Systems.

A

intrusion Detection System (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is sometimes shortened to Intrusion Prevention System (IPS). An IDPS is a network security appliance that monitors network and system activities to detect possible intrusions. In addition to detecting intrustions, it can also prevent them by sending alarms, block malicious network messages (and their responses) so they do not reach their destination, and reset network connections

A

Intrusion Detection & Prevention System (IDPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly