Computer CSO Quiz 2

24 cards   |   Total Attempts: 188
  

Related Topics

Cards In This Set

Front Back
____ is a block cipher that processes blocks of 64 bits. a. SHA-1 b. RC4 c. RC2 d. MD5
RC2
____ encryption uses two keys instead of one. These keys are mathematically related and are known as the public key and the private key. a. Asymmetric b. Symmetric c. Private d. Open
Asymmetric
A similar program known as ____ is a PGP open-source product. a. FreePGP b. GPG c. PGPx d. PGPnix
GPG
Microsoft’s ____ is a cryptography system for Windows operating systems that use the Windows NTFS file system. a. GPG b. AES c. PGP d. EFS
AES
To protect data stored on a hard drive, Microsoft Windows Vista includes ____ drive encryption. a. IDEA b. TPM c. BitLocker d. AES
BitLocker
____ digital certificates are often issued from a Web server to a client, although they can be distributed by any type of server, such as a mail server. a. Software publisher b. Server c. Personal d. Organizational
Personal
In one type of trust model, ____ trust, a relationship exists between two individuals because one person knows the other person. a. indirect b. third-party c. discrete d. direct
direct
The ____ trust model assigns a single hierarchy with one master CA called the root. a. web of b. hierarchical c. direct d. third-party
hierarchical
The TLS ____ Protocol allows authentication between the server and the client and the negotiation of an encryption algorithm and cryptographic keys before any actual data is transmitted. a. Handshake b. Record c. Transport d. Packing
Handshake
Is actually a suite of three utilities—slogin, scp, and ssh—that are secure versions of the unsecure UNIX counterpart utilities rlogin, rcp, and rsh. a. SSH b. TLS c. SSL d. SFTP
SSH
One variation of PPP that is used by broadband Internet providers with DSL or cable modem connections is ____.
a. TLS b. LCP c. PPPoE d. PPTP
____ fire suppression systems do not harm people, documents, or electrical equipment in the room.
a. Water sprinkler b. Clean sprinkler c. Clean agent d. Dry chemical
RAID Level 5 distributes ____ data (a type of error checking) across all drives instead of using a separate drive to hold the parity error checking information.
a. mirroring b. stripping c. segmenting d. parity
A ____ site is generally run by a commercial disaster recovery service that allows a business to continue computer and network operations to maintain business continuity.
a. hot b. warm c. cold d. cool
The ____ is simply the length of time it will take to recover the data that has been backed up.
a. D2D2T b. RPO c. RTO d. D2D