Give us your feedback!
Question:
What is a cryptographic keystream that can only be used once?
Response:
Match the following control types to their purposes
Reducing Risk
Preventative
Correcting violations and incidents
Detective
Corrective controls also help improve existing preventative and detective controls
Discouraging violations
Deterrent
Providing alternate ways of accomplishing a task
Compensating
Restoring systems and information
Recovery
Match the following key terms
Availability
Reliable and timely access to data and resources
Confidentiality
Necessary level of secrecy, unauthorized disclosure is prevented
Shoulder surfing
Unauthorized viewing of information (screen peeking)
Social Engineering
Tricking someone into giving sensitive information (to gain unauthorized access)
A LAN is
a Local Account Name
a Local Authentication Node
a Least Access Notification
a Local Area Network
a Linear Applebaum Network diagram
A WAN is
one of the Wilson-Adder Need types
a Wide Area Network
a Wide Array Node
a Working Authentication Name
the Westinghouse Address Naming convention
More key terms from Chapter 2
Weakness or lack of a countermeasure
Vulnerability
Entity that can exploit a vulnerability
Threat agent
The danger of having a vulnerability exploited
Threat
The probability of a threat being realized
Risk
Presence of a vulnerability which exposes the organization
Exposure