Test Out - 3.0 Cryptographic Solutions Flashcards

1
Q

A digital signature combines

A

a hash and a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TPM stands for

A

Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TPM is a hardware based

A

chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HSM stands for

A

hardware security module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are HSM?

A

Removable encryption device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HSM or TPM which is more powerful

A

HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TPM generate what?

A

Hash values of system components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HMAC stnads for

A

Hash-based Message Autentication Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

GPG stands for

A

GNU Privacy Guard for Linus or MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PGP stands for

A

Pretty Good Privacy for Linux or MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TDE stands for

A

Transparent Data Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TDE is used for

A

Entire database and data at rest,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DRA stands for

A

Data recovery agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Load Balancers on layer 4 make

A

forwarding decision on IP address
TCP/UDP port values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OAuth offer

A

authorization services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is PAM?

A

A pluggable authentication module (PAM) is for Linux

17
Q

What is DACL? (Discretionary Access Control List)

A

Controls who can access an object.

18
Q

Load Balances at Layer 7 make

A

fowarding decisions on app-level data
URL web address requests
Data types: video or audio streaming

19
Q

Can WAF be part of a Load Balancer

20
Q

UTM stands for

A

Unified Threat Management