Create
Learn
Share

C178 Test Review 3b

rename
its4forscience's version from 2018-01-19 01:01

Section

Question Answer
Areas to consider when while developing business policies are? (1 of 5)seperation of duties
Areas to consider when while developing business policies are? (2 of 5)job rotation
Areas to consider when while developing business policies are? (3 of 5)change management
Areas to consider when while developing business policies are? (4 of 5)acceptable use
Areas to consider when while developing business policies are? (5 of 5)mandatory vacations
a physical device that provides a random codetoken (not a security token)
a type of authentication meant to protect clients, not the networkmutual authentication
SHA hash function has a block size of 512bits, what size bit value does it produce?160 bit
guidelines for reviewing codeOWASP (Open Web Application Security Policy)
Does webmail qualify as Saas?Yes, yes it does :D
application running on a clound infrastructure is what type of aaS?PaaS (Platform as a Service)
A combinational servoce of PaaS, network treated as a marketing resourceNaaS (Network as a Service)
is S/MIME symmetric or asymmetric?it is asymmetrical
what kind of multicast traffic is sent to a single MAC but is processed by multiple hosts?IGMP, can be used for games and videos
a Key Distrobution Center (KDC) is used for what?Kerberos
TACACS is primarily used in what environment?Unix
CAC (Common Access Card) is used by who?used by the DoD for military personel
type of access control geared toward a pre-established process that can't be changed by usersMAC (Mandatory Access Control)
what is created when a user authenticates and is then destroyed when the session is over?token
what type of access control assigns specific roles to a user? ex. backup op.RBAC (Role-Based Access Control)
what type of access control allows flexibility within the network?DAC (Discretionary Access Control)
exists between domain and child, creates the relationshiptransitive access (not LDAP!)
memorize