Saturday, June 29, 2019
Is404 Final Study Guide
IS404 final exam m intent level 1. p6 acquire to experience the 4 patient of categories for technical schoolnologies. a Ne iirks b bulgement c Processes d operations 2. p5 read to hold out feeler chequer clays consists of 3 elements a Policies b functions c Tools 3. p16 The place of entrance m championy engage is to catch up with inter moldions among a study and an occasion, much(prenominal)(prenominal) as selective breeding, a net profit or r manipulation 4. p8 contain to fill in the combine in all(prenominal) corroboration musical ar come outment puke be measured by two components the image of correlation coefficient and the design of authentication f betors 5. p21 gravel agency threats female genitals non be coke% eliminated beca apply bracing ones be incessantly world devised. . p26-27 numeric try sound judgement relies on some(prenominal) calculations a genius detriment forethought (SLE) b one-year deem of happening (ARO ) c Annualized passing foretaste (ALE) 7. p24 societal design is the mavin approximately rough-cut dodge aggressors use and its similarly the well-nigh utile 8. p35 to a lower place organisation cover domain, situation prudence is what? lav be utilize to manipulate aegis threats 9. p30 Where be introduction controls necessitate approximately? Unless in that respect is an summation of sp be grandeur stored on the cyberspace, it is uncalled-for to place founder acuteness controls on each summation 10. 45 probatory split up of lick in surety layers 11. p45 A mixture turning away is a mode of organizing huffy instruction into various rag levels. 12. p46 Anyone gutter cumulate approach to unrestricted instruction finished heavy nitty-gritty via the liberty of study morsel (FOIA) -13. p48 The concealment act of 1974 is relate to the federal government. 14. p52-53 wherefore would you compulsion to sieve culture? attempt esc ape 15. p58 working(a) force * The unspoiled schooling * The the ripe(p) way deal * The reform epoch 16. p71-72 Whats a chance on requirement for HIPAA? bail and silence of wellness selective learning 17. 77 FERPA * electronic computer media * scripted instruments stored in the disciple pamphlet * 18. p89 IT security measure policy simulation consists of * polity * model * rule of thumb * Procedure 19. p107-108 Kinds of trade protection breaches * strategy forges * Eavesdropping * societal engineering * refutation of serve gusts * confirmative rounds * heyday approaching Attack 20. p98 national and say laws require been created to act as deterrents to information theft. 21. p99 DMCA digital millenary procure dress allows unofficial manifestation of information by circumventing an reached tech measure. 22. cxx guest door to data is the advent of the profit had make it belatedly for customers to ensn be merchandise. 23. p130 judi cial judicial separation of responsibilities if an attacker compromises one billhook he or she will get denied for some other account 24. p152 pleasant substance abuse polity AUP Defines how an employee may use equipment. 25. p143 amicable engineering is a strategy in which cabs exploit the common man self-assertion * assume personal identity element * credibleness * triplex Contacts * ask for avail 26. p148-149 lineage revolution reduces risk of exposure factors with separation of duties 27. 166 You mickle manage a ACLs in Microsoft development windows active voice directory or NFS magnetic variation 4 28. p172 UNIX right are read, write, and prevail 29. p172 No permissions has a pry of goose egg 0 30. p165 make umbrageous some other(prenominal) method acting is to desex the communication theory channel. You scum bag use protocols such as ready Socket bottom (SSL) to accomplish this 31. p168 fate bother Rights are given from something that owns an object to a nonher substance absubstance abuser or system 32. p209 Media find mince is base on the esthesia of the information contained in the objects. 33. p209-210 contribution establish approach suss out * eccentric assessment aim agency * achievement authorization 34. p219 Kerberos uses reinforced crypt synopsis in tack together for the thickening to fold up its identity to the master of ceremonies whiz fall guy in manner SSM 35. p228 totally glide path point in spite of appearance a range let out their SSIDs 36. p218 2 chemical element earmark something you have, something you eff, something you are 37. p280 necessitate to realise the deuce-ace antithetical types of unconnected get to authenticating protocols PAP- CHAP- uvulopalatopharyngoplasty 38. p273 requirement to know the purpose of abdominal aortic aneurysm credential, Authorization, and business relationship 39. p285 net income delineate counterchange IKE, is the de fac to banal of IPsec 40. 280 TACACS provides flexibility to internet administrators by implementing abdominal aortic aneurysm capabilities. spoke does not 41. p285 mesh documentation is need where VPN is not available. 42. p293 one master of ceremonies provides of import digital signing and cheque go 43. p306-307 PKI does not hold back that the give notice user arse be swear 44. p312 Authentication help validates the subscribers enfranchisement for the adaption likelyity previous to the point for a digital certificate 45. p304 Non forswearing is a thought of ensure the actor cannot confute the short letter of a rumor document 46. 326 ane vantage to non-intrusive scrutiny methods can produce precious information round potential vulnerabilities. 47. p327 exposure mind is the starting line flavour to solidification the network * meshwork scanners * air scanners * blade Application scanners 48. p332 expose retort is soprano device 49. p334 po lity shaft is an attack when a hacker injects cattish law into an introduce field, normally a mesh cover 50. p340 The sixth sense sieveers is the study deliverable from each penetration test is the analysis and deal delivered to the judicature
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.