security concepts Flashcards

1
Q

A _____ is a group of honeypots that mimic the functionality of a network

A

honeynet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____ is a server that is intentionally left open or available, so that an attacker will be drawn to it versus a live network.

A

honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A _____ is a device used to generate, maintain and store cryptographic keys. It can be an external device and can easily be added to a system.

A

Hardware Security Module (HSM)

The HSM will maintain the integrity of the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The _____ is a hardware-based encryption solution that is embedded in the system and provides secure key storage for full disk encryption.

A

Trusted Platform Module (TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _____ is a known secure starting point by embedding a private key in the system. The key remains private until the public key is matched.

A

hardware root of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ is a database de-identification method where all or part of data in a field is substituted with a randomly generated token

A

Tokenization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A _____ is a hardware device used to encrypt Transport Layer Security (TLS) traffic and should be placed close to the desired off-loading device.

A

Secure Socket Layer (SSL) Accelerator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ is the method of disguising coding methods by way of renaming variables, replacing strings, and hiding code comments.

A

Code obfuscation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____ describes the sociopolitical outlook of a nation concerning computing technology and information. Some nations may respect data privacy more or less than others. Care needs to be considered when storing such data.

A

Data sovereignty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A _____ system can integrate with a mail gateway server to examine the contents of the email or attachments and determine if it can be sent

A

Data Loss Prevention (DLP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly