AIS Chap 7

Card Set Information

Author:
blemus
ID:
17802
Filename:
AIS Chap 7
Updated:
2010-05-04 18:17:13
Tags:
Chapter Quiz
Folders:

Description:
book
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user blemus on FreezingBlue Flashcards. What would you like to do?


  1. _________ is primarly a mangement issue
    Information security
  2. Firewalls are an example of
    Preventive Controls
  3. The control procedure designed to verify a users identity is called
    Authentication
  4. A weakness that an attacker can take advantage of to either disable or take control of a system is called
    Vulnerability
  5. a technique that involves the creation and use of a pair of public and private keys
    Asymmetric encryption
  6. Which of the following is a preventive control

    1. Penetration testing
    2.DES= algorythim
    3.Training
    4.Log Analysis
    Training
  7. The approach to perimeter defencse that involves examining only information in the packet header of each individual IP packet is referred to as
    Static Paket filtering
  8. In order to create a digital signature
    the sender encrypts a hash using the senders private key
  9. Whcih of the follwoing is an authoriztion of control?

    a.fingerprint reader
    b.compatibility test
    c.encryption
    d.log analysis
    Compatibility test (a compatibility test uses an access control matrix to determine what actions an authenticated user is allowed to perform)
  10. Modifying default configuration to improve security is called
    hardening

What would you like to do?

Home > Flashcards > Print Preview