Random Topics to memorize PT 4 Flashcards

1
Q

This is the type of agreement that you could find between a manufacturer and a resaler.

A

Business Partner’s Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This is an agreement between to parties that dictates the minimum level of services that would be required.

A

Service Level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This defines security controls when multiple parts of the federal government are connecting to each other.

A

Interconnection Security Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is an informal letter of intent that multiple parties sign. This is NOT a contract, just a formal letter.

A

Memorandum of Understanding (MOU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Takes it a step further from an MOU. A legal document where certain parties agree on terms. But unlike a contract they may not contain legally enforceable promises.

A

Memorandum of Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

There may actually be levels of recovery between the 0% and 100% availability. This is where you can determine at what point in the recovery process have you passed one of those objective marks.

A

Recovery Point Objective (RPO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is where you ask, how much time can we expect between one failure and another?

A

Mean Time Between Failures (MTBF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This would be the average time to restore a system once it fails.

A

Mean Time To Restore/Repair (MTTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Not the same as MTTR. With this the system is not reparable. It’s a system that must be replaced if there is a failure. This gives a reasonable idea of the lifetime expected for a particular item.

A

Mean Time To Failure (MTTF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is the first step to determining what kind of privacy requirements are needed for any particular part of data.

A

Privacy Threshold Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This makes sure that the systems and the processes set in place are compliant with the current laws and regulations. You’ll need to determine what kind of PII is being gathered. All the information that is gathered is included in the Privacy Act Statement that is provided to the users.

A

Privacy Impact Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These certificates in a binary format. Mostly see it associated with Java certificates.

A

DER (Distinguished Encoding Rules)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is a type of certificate format that you would get from a certificate authority. it is in ASCII format so it is readable.

A

PEM (Privacy Enhanced Mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

“_____” is used the same way that .p12 is. It is used on Windows OSs and is used to store cryptographic keys

A

.pfx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is primary used in Windows. Commonly holds the public key. If you needed to transfer secret keys you could use the .pfx file format. You’ll see the file extension as “___”

A

.cer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Certificate format that is used to store different kinds of certificates. Can be password protected.

A

.p12

17
Q

This allows secure remote access to a system through a VPN connection. It uses TCP port 1701.

A

L2TP (Layer 2 Tunneling Protocol)

18
Q

Which type of public key cryptography uses a web of trust model?

A

PGP (Pretty Good Privacy)

19
Q

What is an attack that can abuse the chain of trust?

A

A transitive attack.
If Server A trusts Server B, and Server B trusts Server C, people with access to A now have access to C. If someone is able to access Server A, they would have access to all the servers.

20
Q

This is also known as an inline proxy, intercepting proxy or forced proxy, is a server that intercepts the connection between an end-user or device and the internet. It does so without modifying requests and responses.

A

Transparent Proxy

21
Q

This is a type of proxy that modifies the request or response in order to provide some added service to the user agent, such as group annotation services, media type transformation, protocol reduction, or anonymity filtering. It can also filter traffic by URL.

A

Non Transparent Proxy