Thing i dont know Flashcards

(20 cards)

1
Q

What DKIM

A

Allows sender to have domain name to authenticate they are sending it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is MTA

A

Mail Transfer agent is responsible for transferring and routing emails between servers and it does employ cryptographic signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is DMARC?

A

It build within DKIM and SPF and only handles the mails doesn’t authenticate with SPF and DKIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is RPO

A

The maximum acceptable amount of data loss measured in time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is MTBF

A

Measures the average operation period between failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RTO

A

the amount of time it take to restore its data and business activities after the disaster has happened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is technical debt?

A

this is when you choose quick and easy solutions rather than picking more scalable approaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is UTM

A

this when you use one cybersecurity solution for multiple security needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Configuration enhancement

A

Does not allow user to make changes by applying predefined security rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Difference between insider threat and shadow threat?

A

insider threats is within a company trying to misuse his access whereas a shadow threat is an unauthorized user who takes advantage of gaps within the security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

UBA

A

this is cybersecurity technique which monitors activities to detect anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

time of use

A

this is when an attacker gets an opportunity to manipulate the file afters it creation but before it used by an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EAP, ICMP and IPsec

A

EAP- a network access protocol which handles multiple authentication methods
ICMP- used by devices like router to send error messages like requested service is not available or could not reach router
IPSec- it helps to secure internet communication across an IP network by protecting the data through encryption and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Email standards

A

SPF- This helps in preventing tricking (spoofing)because it allows domain owners to specify which mail servers are authorized send emails on their behalf.

SMTP- this is basically the protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is AML and KYC

A

(Anti-Money Laundering) and (Know Your Customers) ensures that bank practices are in line with legal requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Backups

A

Continuous backups- this is instant backups
Weekly backups- this is done weekly
Daily - done at the end of the day

17
Q

Key Stretching and Salting

A

Key stretching - it hashes the password to make it look longer and making it harder to brute force attack

Salting- it uses cryptography to add random data to the input of hash function to increase security

18
Q

Difference between data owner, data controller and data processor

A

Data owner - defined all the policies and security requirement’s

Data controller - defines data processing purposes

Data processes- handles the data based on the data controller instructions

19
Q

Key escrow

A

This is a copy of the cryptographic key given to a third party user if lost they have a spare key