AIS Chap 7

  1. _________ is primarly a mangement issue
    Information security
  2. Firewalls are an example of
    Preventive Controls
  3. The control procedure designed to verify a users identity is called
    Authentication
  4. A weakness that an attacker can take advantage of to either disable or take control of a system is called
    Vulnerability
  5. a technique that involves the creation and use of a pair of public and private keys
    Asymmetric encryption
  6. Which of the following is a preventive control

    1. Penetration testing
    2.DES= algorythim
    3.Training
    4.Log Analysis
    Training
  7. The approach to perimeter defencse that involves examining only information in the packet header of each individual IP packet is referred to as
    Static Paket filtering
  8. In order to create a digital signature
    the sender encrypts a hash using the senders private key
  9. Whcih of the follwoing is an authoriztion of control?

    a.fingerprint reader
    b.compatibility test
    c.encryption
    d.log analysis
    Compatibility test (a compatibility test uses an access control matrix to determine what actions an authenticated user is allowed to perform)
  10. Modifying default configuration to improve security is called
    hardening
Author
blemus
ID
17802
Card Set
AIS Chap 7
Description
book
Updated