Section 1.2 Flashcards

1
Q

What are the 4 steps taken to check a file for integrity?

A

A hash is created for the original file

then the hash is encrypted using the creator’s private key

the recipient decrypts the hash with the creator’s public key

then a hash function is performed on the received file to compare with the hash from the original file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PEP

A

Policy Enforcement Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PA

A

Policy Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PE

A

Policy Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the PE do?

A

Allow or Deny access based on conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the PEP?

A

the gatekeeper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the PA?

A

the creator/editor of policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly