1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the key components of the Zero Trust Control Plane's Policy Decision Point (PDP)? (Select 2 answers)
Policy Engine (PE), Policy Administrator (PA)
Which of the following statements about honeypots are true? (Select 2 answers)
Honeypots mimic real systems to attract cyber attackers, Honeypots contain apparent vulnerabilities that are closely monitored by a security team
A honeyfile can be any type of file (e.g., a document, email message, image, or video file) containing real user data intentionally placed within a network or system to attract potential attackers or unauthorized users. (T/F)
False
What is a honeytoken?
A unique identifier that is designed to track attackers
Which of the following should not be used as honeytokens? (Select all that apply)
Active user account credentials, Actual URLs to live websites or resources
A process used by organizations to assess and evaluate the potential impact of disruptive incidents or disasters on their critical business functions and operations is referred to as:
Business Impact Analysis (BIA)
A hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates is known as:
Public Key Infrastructure (PKI)
Which of the following answers refers to a data storage device equipped with hardware-level encryption functionality?
Self-encrypting drives (SEDs)
Which of the answers listed below refers to software technology designed to provide confidentiality for an entire data storage device?
Full Disk Encryption (FDE)
An MS Windows component that enables encryption of individual files is called:
Encrypting File System (EFS)
Which of the following software application tools are specifically designed for implementing encryption algorithms to secure data communication and storage? (Select 2 answers)
GNU Privacy Guard (GPG), Pretty Good Privacy (PGP)
Which of the following answers refers to an obsolete protocol used for secure data transfer over the web?
SHTTP