AIS Chap 7
Home > Preview
The flashcards below were created by user
on FreezingBlue Flashcards.
_________ is primarly a mangement issue
Firewalls are an example of
The control procedure designed to verify a users identity is called
A weakness that an attacker can take advantage of to either disable or take control of a system is called
a technique that involves the creation and use of a pair of public and private keys
Which of the following is a preventive control
1. Penetration testing
The approach to perimeter defencse that involves examining only information in the packet header of each individual IP packet is referred to as
Static Paket filtering
In order to create a digital signature
the sender encrypts a hash using the senders private key
Whcih of the follwoing is an authoriztion of control?
Compatibility test (a compatibility test uses an access control matrix to determine what actions an authenticated user is allowed to perform)
Modifying default configuration to improve security is called
What would you like to do?
Home > Flashcards > Print Preview