SYO 401 Sec Plus!!! Remember THIS points
Terms in this set (6)
DNS poisoning attacks attempt to corrupt DNS data.
A pharming attack redirects a web site's traffic to another web site and can do so by modifying the hosts file on the user's system.
A hardware security module (HSM)
A hardware security module (HSM) is a removable or external device that can generate, store, and manage RSA keys used in asymmetric encryption. Many server-based applications use an HSM to protect keys.
A Trusted Platform Module (TPM)
A Trusted Platform Module (TPM) is a hardware chip on the motherboard included on many newer laptops and it provides full disk encryption. A TPM includes a unique RSA asymmetric key. When a user activates the TPM, it
creates a storage root key, which the TPM uses to generate and store other cryptographic keys.
The primary methods of protecting the confidentiality of data
The primary methods of protecting the confidentiality of data (including data at rest and data in transit) are with encryption and strong access controls.
Mobile device management tools
Mobile device management tools help ensure systems are up to date with current patches and have up-to-date antivirus installed. These tools often block devices that are not up to date.
YOU MIGHT ALSO LIKE...
Accounting Information Systems
IGCSE Comp Mock
SY0-401:4 TS Quiz Application, Data, and Host Security
Sec+ Chapter 5
OTHER SETS BY THIS CREATOR
Chapter 11 Practice Questions
Chapter 7 Practice Questions
Chapter 6 practice Questions
Chapter 5 set
THIS SET IS OFTEN IN FOLDERS WITH...
Security + SYO-401 Ports
Security+ SYO-401: Objective 1.1
Security plus 401 questions
Security+ SYO-401 Ports and Their Associated Protocols