Security 6.6 Flashcards

1
Q

Plain Text

A

unencrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cipher Text

A

an encrypted message

*Uses an algorithm to encrypt or decrypt a message.

Not encryption!!!!!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data at rest

A

Data that is in some sort of persistent storage media.

Ex. whole disk, mobile device, database, file-to-folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data in transit (MOTION)

A

state when data is transmitted over a network, such as communicating with a web page vis HTTPS or sending an email.

EX. SSL/TSL, (think transport encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mobile Device Encryption

A

100% always encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

V.P.N.

A

Virtual Private Network
connects a remote host with a internet connection to private local network.

Uses encryption and connect protocols to create a tunnel that is secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of encryption is used by mobile applications to encrypt data in-transit?

A

Public Key Infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Public Key Infrastructure PKI

A

implementation of asymmetric encryption used by mobile applications for encrypting data in-transit.

(users or server computers use validation by a Digital Certificate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of threat does disk-level encryption protect against?

A

Information snooping after the theft of a laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disk-level encryption

A

technique the encrypts the entire contents of a hard drive.

disk-level encryption only protects data at-rest!!!!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of network uses tunneling to encrypt data, protecting communications between two endpoints sent through a public network?

A

A Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What option on iOS protects email and other apps’ data at-rest by using encryption?

A

The “Data Protection” option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of encryption is used by mobile applications to encrypt data in-transit?

A

Public Key Infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user wants to transmit a sensitive file via an unsecure method such as email. What technique would you recommend?

A

Using file-level encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fault Tolerance

A

systems that contain additional components to help avoid a “single point of failure.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data Redundancy

A

Combines hard disks into an array to help avoid service unavailability due to one or more disk failings

(Redundant Array of Independent Disks)

17
Q

Network Redund

A

Uses multiplee Network cards.

(Think Network Cabling- using multiple pathways between servers, I.E. Routers