IS4550 CHAPTER 11 Flashcards Preview

IS3230 ACCESS CONTROL, KEY INFRASTRUCTURE > IS4550 CHAPTER 11 > Flashcards

Flashcards in IS4550 CHAPTER 11 Deck (22):
1

A process that performs a sequence of operations is called ___.

ALGORITHM

2

Provides services for an application program to ensure effective communication is called ___.

APPLICATION LAYER

3

Documenting rules, procedures, and guidelines to be tested against a system is called ___.

ASSESSMENT

4

A normal level of measurement is called ___.

BASELINE

5

Activities that occur between two or more businesses is called ___.

BUSINESS TO BUSINESS (B2B)

6

Activities that occur between a business and a customer is called ___.

BUSINESS TO CUSTOMERS (B2C)

7

Network components that interconnect network nodes or hosts is called ___.

DATA-LINK LAYER

8

A data structure used to bind an authenticated individual to a public key is called ___.

DIGITAL CERTIFICATE

9

Provides services for connecting network resources across network domains is called ___.

INTERNET LAYER

10

The encryption key that is held privately by the user is called ___.

PRIVATE KEY

11

This used to communicate with the private and is publicly available and is called ___.

PUBLIC KEY

12

Methods and protocols for encapsulating application data is called ___.

TRANSPORT LAYER

13

1. E-commerce and banking sites should have no encryption enabled because that communist ion between the two points is already protected via the user ID.
TRUE OR FALSE

FALSE

14

2. ___ is the largest developer and publisher of international standards.

ISO

15

3. Intranets are extensions of the corporate network for business partners and customers.
TRUE OR FALSE

FALSE

16

4. Which of the following indicates you are using a secure Web site? (Select two)
1. Web address starts with "shttp"
2. Web address starts with "https"
3. Padlock icon
4. Key icon

Web address starts with "https"
Padlock icon

17

5. Which of the following are characteristics of Web 2.0? (Select three)
1. Encryption
2. Wikis
3. Blogs
4. Secure Web sites
5. Social media Web sites

Wikis
Blogs
Social media Web sites

18

6. Which organization develops RFCs?
1. NIST
2. FISMA
3. ISO
4. IETF

IETF

19

7. ____ is a body of the US government that provides standards for financial institutions.

FFEIC/Federal Financial Institutions Examinations Council

20

8. E-commerce implementation using SSL should use a minimum of ___-bit encryption.

128

21

9. What is a trusted source for an SSL certificate called?
1. Trusted certificate
2. Trusted authority
3. Certificate authority
4. Certificate trusted

Certificate authority

22

10. ___ sets the FISMA standards for the federal IT systems.

NIST