Redundancy and fault tolerance support this part of the CIA triad.
What is Availability?
This type of hypervisor runs within a conventional operation system environment and is also known as a Hosted hypervisor.
What is Type 2?
This remote access protocol provides centralized authentication and authorization, and was succeeded by DIAMETER.
What is RADIUS?
This type of digital certificate is cheap and easy to deploy for a company with multiple domains, but if compromised could result in compromising those domain servers.
What is a wildcard certificate?
This social engineering attack targets personnel who are assumed to have access to significant amounts of data, such as C-level executives.
What is Whaling?
Of In-house Developed, Commercial, Tailored Commercial, and Open Source, this software type is usually considered to have the most flexibility.
What is Open Source?
What is Hybrid cloud?
This biometric scan is considered the most intrusive of all physiological systems.
What is a Retina scan?
The current government symmetric encryption standard, AES requires this block size.
What is 128?
This unsecure email protocol allows clients to download copies of their messages to multiple devices.
What is IMAP4?
Running this type of application in a virtual environment is one way to ensure its interoperability with current systems, despite its age.
What is Legacy?
This occurs when the attacker breaks out of their VM environment and can affect other VMs or even the physical server.
What is VMEscape?
Security questions that ask for information such as mother's maiden name and high school mascot fall into this category of password.
What is a Cognitive Password?
Cryptocurrency such as Bitcoin uses this process where data is verified and added to a ledger, providing public proof of transaction.
What is blockchain?
If RDP is to be used only inside the corporate LAN, this port number should be blocked on the perimeter firewalls.
What is 3389?
When data from multiple sources is aggregated, it can lead to this type of attack where someone can piece together information they should not be able to access.
What is (data) inference?
This cloud service model lets customers deploy applications they created or acquired onto the cloud infrastructure. They do not manage or control the underlying operating system.
What is Platform as a Service (PaaS)?
This standard implements centralized SSO via a Key Distribution Center in a corporate network.
What is Kerberos?
Alice sends a message to Bob and wants to make sure that Bob can verify it came from her. Both possess key pairs. What TWO keys are used in the encryption and decryption processes?
What are Alice's private and public keys?
Given the various concerns over cloud-based storage, this is the best way to ensure that data your company sends to the cloud is well-protected and confidential.
What is encrypting the data before uploading to the cloud?
This term refers to widely adopted standards that have not been FORMALLY adopted.
What is De Facto?
Some devices such as those with Apple's Touch ID have this feature that handles sensitive cryptographic operations, has a separate processor, and boots separately from the rest of the device.
What is a Secure Enclave?
This authorization standard is best used when an application accesses another app's API on behalf of the user, but should only have restricted access to that user's data.
What is OAuth?
This is an alternative to the typical OCSP scenario where the server provides a time-stamped OCSP response to any visiting clients to prove its identity.
What is stapling (OCSP stapling)?
This protocol features encryption and anti-replay capabilities while delivering audio and video over IP networks.
What is Secure Real-Time Protocol (SRTP)?