Security Flashcards

1
Q

What is 802.1x

A

??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Replay Attack?

A

???

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Zero Trust?

A

??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

technical debt?

A

Technical debt refers to the consequences of choosing easy or quick solutions that may cause problems in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS Filtering?

A

??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Proxy Server?

A

??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital Watermarking?

A

??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Matrix?

A

??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Decentralized Governance

A

??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

e-discovery?

A

??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spraying?

A

??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The maximum acceptable time allowed for the recovery of a system or process after a disruption?

A

MTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ensures that every transaction is viewable by everyone, thus promoting transparency and trust?

A

Open Public Ledger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Defines the process of checking modifications or advancements in software collections, guaranteeing their security and the absence of vulnerabilities, particularly in environments with numerous dependencies such as node.js or Python libraries?

A

Package Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Model that allows developers to write and deploy code without concern for the underlying infrastructure because the cloud provider automatically manages the execution, scaling, and networking?

A

Serverless Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Employs an expanding list of transactional records, each referred to as a block, and each block validates the hash of the previous one.

A

Blockchain

17
Q

Risk analysis involving the use of subjective measures such as descriptive terms (e.g., high, medium, low) to assess risks based on their impact and likelihood.

A

Qualitative

18
Q

System where employees must have a token to gain access to certain areas within the company building.

A

Acess Badges

19
Q
A