What is the set of protocols and standards that provide automated ways to create,
manage, and use trust relationships between servers and clients?
Give this one a try later!
trust framework
This baseline sets certain thresholds for specific errors or mistakes allowed and the
amount of these occurrences that can take place before it is considered suspicious?
Give this one a try later!
clipping level
,What type of control are we using if we supplement a single firewall with a second
standby firewall ready to assume responsibility if the primary firewall fails?
Give this one a try later!
high availability
What is an internet segment logically restricted to users who are members of the
organization (that is, insiders)?
Give this one a try later!
intranet
T or F. Security leaders planning to deploy a new security control should develop a
business case for that control.
Give this one a try later!
T
Which authentication protocol requires the use of external encryption to protect
passwords?
Give this one a try later!
, PAP
T or F. Federal law requires U.S. businesses to report verified security incidents to US-
CERT.
Give this one a try later!
F
What does STRIDE stand for?
Give this one a try later!
spoofing, tampering, repudiation, info disclosure, DoS, elevation of
privilege
Soft control is another way of referring to what?
Give this one a try later!
administrative control
What is the triple-a of identity management?
Give this one a try later!
manage, and use trust relationships between servers and clients?
Give this one a try later!
trust framework
This baseline sets certain thresholds for specific errors or mistakes allowed and the
amount of these occurrences that can take place before it is considered suspicious?
Give this one a try later!
clipping level
,What type of control are we using if we supplement a single firewall with a second
standby firewall ready to assume responsibility if the primary firewall fails?
Give this one a try later!
high availability
What is an internet segment logically restricted to users who are members of the
organization (that is, insiders)?
Give this one a try later!
intranet
T or F. Security leaders planning to deploy a new security control should develop a
business case for that control.
Give this one a try later!
T
Which authentication protocol requires the use of external encryption to protect
passwords?
Give this one a try later!
, PAP
T or F. Federal law requires U.S. businesses to report verified security incidents to US-
CERT.
Give this one a try later!
F
What does STRIDE stand for?
Give this one a try later!
spoofing, tampering, repudiation, info disclosure, DoS, elevation of
privilege
Soft control is another way of referring to what?
Give this one a try later!
administrative control
What is the triple-a of identity management?
Give this one a try later!