DIGITAL TEST BANK - COMPTIA SECURITY+ GUIDE TO
NETWORK SECURITY FUNDAMENTALS,CIAMPA,7E
Access Control List (ACL) - (ANSWER)A set of permissions or rules attached to an object that
administer its availability by granting or denying access
access control scheme - (ANSWER)A framework embedded in hardware and software that can
be used for controlling access.
accounting - (ANSWER)A record that is preserved of who accessed the network, what resources
they accessed, and when they disconnected from the network
admissibility - (ANSWER)Evidence that can hold up to judicial scrutiny and can be entered as
evidence
artifacts - (ANSWER)Technology devices that may contain evidence in a forensics investigation
Attribute-based access control (ABAC) - (ANSWER)An access control scheme that uses more
flexible policies that can combine attributes.
authentication servers - (ANSWER)Servers that facilitate authentication of an entity to access a
network
authorization - (ANSWER)granting permission to take action
Autopsy - (ANSWER)a digital forensics platform
cache - (ANSWER)A type of high-speed memory that stores recently used information so that it
can be quickly accessed again at a later time
call manager - (ANSWER)A platform used to provide telephony, video, and web conferences
, chain of custody - (ANSWER)a process that shows evidence was always under strict control and
no unauthorized person was given the opportunity to corrupt to evidence
communication plan - (ANSWER)A formalized plan that outlines the internal and external
constituents who need to be informed of an incident, how they should be informed, and when it
should take place
conditional access - (ANSWER)dynamically assigning roles to subjects based on a set of rules
containment - (ANSWER)An incident response plan step for limiting the damage of the incident
and isolating those systems that are impacted to prevent further damage
cyber kill chain - (ANSWER)An exploitation framework that outlines the steps of an attack in an
integrated and end-to-end process like a "chain"
data breach notification law - (ANSWER)A law that requires user notification of a data breach
data controller - (ANSWER)the principal party for collecting data
data custodian/steward - (ANSWER)an individual to whom day-to-day actions have been
assigned by the owner
data owner - (ANSWER)the person responsible for the data
Data Privacy Officer (DPO) - (ANSWER)A manager who overseers data privacy compliance
and manages data risk
data processor - (ANSWER)a proxy who acts on behalf of a data controller
dd - (ANSWER)an imaging utility used for generating a physical copy
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller tivakiok. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.