Test Study 2 Flashcards
In networking, what is DTE?
Data terminal equipment, typically customer equipment that needs communication services.
What is 802.15.1
The standard for PAN or bluetooth.
What is a popular name for a PAN
bluetooth
What is shibboleth?
An SSO standard based on SAML. It is open source and capable of working with many identity providers.
What is a key stretching algorithm commonly used by Linux?
Bcrypt
What is a routing protocol that points packets in the lowest cost direction?
RIP
What is a group of standards to assist in automated assessments?
SCAP
What routing protocol is simple and indicates the best initial direction for each packet?
Distance vector.
What is HAVAL?
A broken hash algorithm with variable hash lengths from 128 to 256 bits that allows the user to specify the number of rounds.
What is a green bar certificate?
An extended validation certificate, requires legal entity proof of the owner.
What are some characteristics of compartmentalized security mode?
All users require NDA All info requires clearance Some info requires approval Some info is need to know All users can access some information
What is a business resumption plan?
Procedures and checklists to resume normal operations after a disaster.
What would a list of resources, actions, and information kept ready for a specific emergency be called?
COOP
What is required for proof of a domain validation certificate?
Ownership of the DNS records, whois, or the domain.
What hash algorithm allows you to specify length and number of rounds?
HAVAL
What is the standard for bluetooth?
802.15.1
What is the standard for packet-switching on older telephone services?
X.25
What is distance vector?
A simple protocol that indicates the best initial direction for each packet.
What is Frame Relay?
A packet switched service that can handle multiple virtual circuits and a variety of network types. It has a committed minimum data rate.
What is EIGRP?
A cisco made, distance vector based routing protocol.
What does Classifying do?
Classifying sets the sensitivity levels for data.
In networking, what is DCE?
Data communications equipment, typically telephone equipment.
What does Categorizing do?
Identifies assets with regard to their impact if lost.
What are the characteristics of OSPF?
link state routing, where each device creates a map of the network and chooses the most efficient routing.
What is the term for the threshold established to prevent logging every event?
Clipping level.
What is a standard for non-repudiation and digital signing?
DSA
What is a SCAP?
security content automation protocol - a group of standards to assist in automated assessment and the management and identification of vulnerabilities.
Which RAID levels can survive 2 drives failing?
RAID 6 and RAID 1+0 (10)
What is another name for bluetooth?
PAN or personal area network
How many bits of length is HAVAL?
128 to 256
What is clipping level?
The threshold for established logging and alerting to avoid logging every single event.
What does transposition encryption do?
Rearranges the letters without changing them?
What are the procedures and checklists to resume normal operations after a disaster called?
Business resumption plan
What is Bcrypt?
A key stretching algorithm commonly used by Linux
What is DSA?
Digital signing algorithm, provides non-repudiation.
In encryption, what is a short lived item only used for a little while and then discarded and regenerated that is also a helpful protection from eavesdropping?
Session key
What renders a compromised system completely safe?
Data sanitization
What is data diddling?
An act of interfering with data at the entry point, usually by a malicious insider.
What are the characteristics of dedicated security mode?
All require NDA Clearance required for all information Approval required for all information All information is need to know All users can access all information
What kind of encryption rearranges letters without changing them?
Transposition
What is EAP?
Extensible authentication protocol, a framework for authentication that you can build upon.
What is X.25?
Standard for packet switched networks using older telephone services.
How many drives can fail in a RAID 6 and it still remain viable?
2
What is a development method that relies on creating components or functions in parallel as if they were mini projects?
RAD
What malicious act is generally from an insider having to do with data entry?
Data diddling.
What is a routing protocol where each device maps the network to choose the most efficient route?
OSPF
What are the characteristics of multilevel security mode?
NDA for all Some data requires clearance Some data requires approval Some data is need to know All users can access some information
What is a set of standards that are flexible and adaptable with sets of policies and recommendations?
ISO27000
What is an open source SSO based on SAML?
Shibboleth.
What is the process to recover and protect the IT infrastructure in the even of a disaster called?
Disaster recovery plan.
What is a COOP?
Continuity of operations plan - gathering of resources, actions, information, and procedures that are kept in readiness to address specific emergencies.
In most to least strict, list the data security modes.
Dedicated, System High, Compartmented, Multilevel
What is an authentication protocol framework?
EAP
What development method relies on customer interaction and feedback?
AGILE
What type of service can handle a variety of network types and has a minimum, committed data rate?
Frame relay
Which type of certification validation requires legal entity proof of the owner?
Extended validation, or green bar.
What is RIP?
A distance vector routing protocol that points packets int he lowest cost direction for efficiency.
What is a disaster recovery plan?
The process to recover and protect the IT infrastructure in the vent of a disaster.
What are the characteristics of system high security mode?
All users require NDA All data requires clearance All data requires approval Some information is need to know, All users can access some data
What is a session key?
A key used for short periods of time, usually a single session, and should no longer be in use when its broken.
What are the four data security modes?
Dedicated
System high
multilevel
compartmented