RFI Flashcards
Bit-copy-tool
Creates bit for bit copy and hashes the contents.
Integrity
Preservation of internal and external consistency
Config management ensures…
Changes do not adversely affect the orgs security policy
What determines how often to change a crypto key?
Confidential importance of the info being protected
Cloud deployment model types…
Public, Private, Community,
Dynamic password
Changes at every logon
Best practices are…
Suggestions. Not reasons for constructing policy
Continuous monitoring involves
Policy, process, and technology used to detect risk.
Nontechnical means to enforce security
Training
Gov’t classification levels
Unclassified, sensitive but unclassified, confidential secret, top secret
“Classified” is not a level.
Every policy should have an…
Enforcement statement
Primary security categories (3)
Prevention, Detection, Recovery
Are biometrics an authentication factor or Accountability
Authentication
Kerberos can use…
Symmetric keys
Certificate contains which key?
Public key