Section 1.2 Flashcards
1
Q
What are the 4 steps taken to check a file for integrity?
A
A hash is created for the original file
then the hash is encrypted using the creator’s private key
the recipient decrypts the hash with the creator’s public key
then a hash function is performed on the received file to compare with the hash from the original file
2
Q
AAA
A
Authentication, Authorization, and Accounting
3
Q
PEP
A
Policy Enforcement Point
4
Q
PA
A
Policy Administrator
5
Q
PE
A
Policy Engine
6
Q
What does the PE do?
A
Allow or Deny access based on conditions
7
Q
What is the PEP?
A
the gatekeeper
8
Q
What is the PA?
A
the creator/editor of policies
9
Q
A