List 6 Examples of
Configuration Management
Define
Data Sovereignty
Define
GDPR
• Among other things, it specifies that data collected on EU citizens must be stored in
the EU
• Extensive and complex
Define
Ciphertext
• Information that has been encrypted, in its encrypted form. The opposite of plaintext.
Define
Confusion
• The difference between a plaintext and its cyphertext is the amount of confusion
Define
Diffusion
• The difference between cyphertexts of plaintexts that are very similar
• Ex., two plaintexts that are identical except for one character should each produce
cyphertexts that are completely different. When they do, they have diffusion.
How to protect data in-transit?
How to protect data at-rest?
Define
Tokenization
Define
IRM
• Can restrict functions on a document such as ability to copy/paste, print, edit,
screenshot, etc.
• Can have different sets of rights for different users
Define
DLP
Define
SSL
• Secure Socket Layer
• Has been replaced by TLS, but TLS is still often referred to colloquially as SSL or
as SSL/TLS
How can SSL/TLS inspection be performed?
What typically causes older hashes to be retired?
• If it runs into collisions (different source data producing the same hash output)
Define
API Injection
How can API be secured? (Four answers)
What does this stand for:
WAF
• Web Application Firewall
Define
Hot Site
Define
Cold Site
Define
Warm Site
Define
Honeynet
• Multiple honeypots on a network
• Can be used to observe multiple attackers, or see what an attack does between
multiple devices
Define
Honeyfiles
Define
Fake Telemetry
• Attackers send fake data to a machine learning system in order to make malicious
malware appear benign
• Once the machine learning is trained on the fake telemetry, it will not detect the
malware
Define
Sinkhole