What is a trusted agent?
Mechanism in which allows a computer to operate.
Instruction
Script
Code
Computer language
For symmetric key cryptography, what is the trusted intermediary called. _____________________________________________
Identify the cryptosystem that makes use of two different keys to encrypt and decrypt a message. _________________________________________
Access control right based on policy
Rule Based
Mandatory
Discretion
Role Based
What is the formula for the annual lost expectancy ______________________________________________________________________________________
Access rights refer to the user’s ability to access a system resource. Identify one of the four access right granted to a subject? _____________________________________________
SHA-1 and MD5 are examples of which algorithm. _____________________________
T or F: One of the factors of credential validation is somewhere you are.
Access control rights granted on the sensitivity of the data
Rule Based
Mandatory
Discretion
Role Based
A file is an example of what type of access control element? ______________________
What type of next generation technology grants access based on human attributes? _________________________________________________
____________________________________________ is where the subject is granted authorization based on need to know.
A hierarchical structure of distributed responsibility where no one individual request to an object should be granted _______________________________________________.
________________________________________ the process of validating the identify of someone or something.
AES, DES, IDEA, and RC5 are examples of which algorithm. ______________________________________________
T or F: One of the factors of credential validation is something you have.
Access control rights granted based on the duties performed by a group
Rule Based
Mandatory
Discretion
Role Based
Identify one of the four elements access control consists of _____________________________________________________________
Also known as session authentication, this password authentication method is link to a short window to execute and can only be used once. _____________________________________________________
Which authentication server configuration allow all information to travel in the clear _________________________________________________
Road warriors utilize ______________________________________________ for use on mobile devices.
The result of applying an encryption algorithm to the original message. __________________________________________________
What is the block cipher mode that encrypt data one byte at a time ________________________________________________________
The art of secret communication
Cryptanalyst
Cryptanalysis
Cryptography
Ctyptosystem
T or F: One of the factors of credential validation is something you had.
Which of the following are human-cause disaster
Snowstorm
Loss of power
Tornados
Electrical Storm
RSA, DSA, and Diffie-Hellman are examples of which algorithm. __________________________________________________
Identify any field of a digital certificate.
What is a trusted agent?