Computer security is often divided into three distinct master categories, commonly referred to as controls: Show
These three broad categories define the main objectives of proper security implementation. Within these controls are sub-categories that further detail the controls and how to implement them. 1.2.1. Physical ControlsPhysical control is the implementation of security measures in a defined structure used to deter or prevent unauthorized access to sensitive material. Examples of physical controls are:
1.2.2. Technical ControlsTechnical controls use technology as a basis for controlling the access and usage of sensitive data throughout a physical structure and over a network. Technical controls are far-reaching in scope and encompass such technologies as:
1.2.3. Administrative ControlsAdministrative controls define the human factors of security. It involves all levels of personnel within an organization and determines which users have access to what resources and information by such means as:
enigma Explanation: 2. Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?Vignere Explanation: 3. Which term describes the technology that protects software from unauthorized access or modification?copyright Explanation: 4. Which three devices represent examples of physical access controls? (Choose three.)swipe cards* Explanation: 5. What term is used to describe the technology that replaces sensitive information with a nonsensitive version?retracting Explanation: 6. Which type of cipher is able to encrypt a fixed-length block of plaintext into a 128-bit block of ciphertext at any one time?transform Explanation: 7. What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?hash Explanation: 8. What type of cipher encrypts plaintext one byte or one bit at a time?block Explanation: 9. What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature generation and key exchange?ECC* Explanation: 10. What is the term used to describe the science of making and breaking secret codes?impersonation Explanation: 11. Which three processes are examples of logical access controls? (Choose three.)guards to monitor security screens Explanation: 12. What term is used to describe concealing data in another file such as a graphic, audio, or other text file?hiding Explanation: 13. What are three examples of administrative access controls? (Choose three.)hiring practices* Explanation: 14. Which three protocols use asymmetric key algorithms? (Choose three.)Telnet Explanation: 15. A warning banner that lists the negative outcomes of breaking company policy is displayed each time a computer user logs in to the machine. What type of access control is implemented?detective Explanation: 16. Which two terms are used to describe cipher keys? (Choose two.)key space* 17. Match the type of multifactor authentication with the description.a security key fob ————> something you have Explanation: 18. Match the description with the correct term. (Not all targets are used.)steganography —————> hiding data within
an audio file Other Incorrect Match Options: 19. Which asymmetric algorithm provides an electronic key exchange method to share the secret key?WEP Explanation: 20. What encryption algorithm uses one key to encrypt data and a different key to decrypt data?Asymmetric* Explanation: Which devices represent examples of physical access controls?Common physical access control examples of access points include security gate systems, turnstiles and door locks.
What are physical access controls?An electronic system that controls the ability of people or vehicles to enter a protected area by means of authentication and authorization at access control points.
What are the three examples of administrative access control?Some examples are access control lists, intrusion detection systems, and antivirus software.
Which three processes are examples of logical access controls?Logical access control is done via access control lists (ACLs), group policies, passwords, and account restrictions.
|