CHAPTER SUMMARY

Understanding the importance of access controls and security policies is vital for every organization. Security is only as strong as the weakest link, and if employees feel that security measures negatively affect their job performance, they may find ways around it.

You have read about best practices for access controls and how they benefit everyone in an organization. Whether it is implementing system access controls, application access, file and folder access controls, or data access controls, or combining them in a multilayer implementation, access control systems are essential for protecting all data, systems, and applications. This chapter also examined ways to secure remote connections and extranets. Data can be secured through VPNs and TLS encryption to protect it while in transit over the Internet.

KEY CONCEPTS AND TERMS

CHAPTER 7 ASSESSMENT

  1. E-commerce and banking sites should have no encryption enabled because the communication between the two points is already protected via the user ID.
    1. True
    2. False
  2. _______________ is the largest developer and publisher of international standards.
  3. Intranets are extensions of the corporate network for business partners and customers.
    1. True
    2. False
  4. Which of the following indicates you are using a secure website? (select two.)
    1. Web address starts with “shttp”
    2. Web address starts with “https”
    3. Padlock icon
    4. Key icon
  5. Which organization develops RFCs?
    1. NIST
    2. FISMA
    3. ISO
    4. IETF
  6. _______________ is a body of the U.S. government that provides standards for financial institutions.
  7. You are creating a SQL Server database account for a user who must be able to create databases on the server. What is the minimum level of access that will allow this activity?
    1. dbcreator
    2. sysadmin
    3. serveradmin
    4. rootadmin
  8. What is a trusted source for a digital certificate called?
    1. Trusted certificate
    2. Trusted authority
    3. Certificate authority
    4. Certificate trusted
  9. _______________ sets the FISMA standards for the federal IT systems.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.91.153