2.1.1 - 2.1.2 Notes Flashcards

1
Q

the unauthorized access or retrieval of confidential or protected data

A

data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a wireless access point that give unauthorized access to secure networks

A

rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

science and art of delivering a message securely and confidentially

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a cipher in which each letter in an alphabet is replaced with a different character or symbol

A

substitution cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a string of characters used as a parameter that determines the output of an encryption algorithm

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an encryption method where the sender and receiver share a private key to use the encryption algorithm

A

private key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

also called shared key encryption, a process in which a single key is used in both the encryption and decryption algorithm to encode/decode data

A

symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a method of paired key encryption in which the key used to encrypt data is made available to anybody and its corresponding decryption key is secret

A

public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

two keys that are related in such a way that one can be used to encrypt data, which can then only be decoded by the other key

A

paired keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

also called public key encryption, an encryption method that uses two keys: a public and private one, belong to one owner

A

asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

an example of public key encryption developed by Rivest, Shamir, and Adelman, the founders of RSA, an American computer/network security company

A

RSA algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

digital document used to verify the authenticity of a server or public key

A

SSl certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

confirm you identity using knowledge only known to you

A

authenticates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

information about individuals that can be used to trace a person’s identity

A

PII (Personally Identifiable Information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

small text-based bits of information about your browser that a web server saves

A

cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

practice of sending fraudulent emails that appear to be from legitimate companies with the intention of sharing sensitive information (password, credit card info, etc.)

A

phishing

17
Q

software intended to damage a computing system or to take partial control over its operation

A

malware

18
Q

the use of a program to record every keystroke made by a computer in order to gain fraudulent access to passwords/confidential information

A

keylogger

19
Q

the process of encoding data to prevent unauthorized access, such as converting plain text or cipher text

A

encryption

20
Q

the process of decoding data, the reverse of the encryption process

A

decrypt

21
Q

method for determining a solution to a problem by sequentially testing all solutions

A

brute force

22
Q

A business or organization that issues a digital certificate verifying that a given public key is owned by the entity named on the certificate.

A

certificate authority

23
Q

A person who is responsible for managing computers, networks, servers, and other computing resources for an organization or group.

A

system administrator

24
Q

to give permission

A

authorization

25
Q

method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism, typically in at least two of the following categories: knowledge (something they know); possession (something they have), and inference (something they are).

A

multi-factor authentication

26
Q

A program that provides visual navigation with menus and screen icons, and performs automated functions when users click command buttons.

A

graphical user interface (GUI)

27
Q

A way programmers share their code with other programmers. In object-oriented libraries, an API specifies the methods of each class.

A

Application Programming Interface (API)

28
Q

chunks of code that have been designed to be added easily to a user’s website or profile page

Standard component of GUI

A

widgets

29
Q

A mistake in the algorithm or program that causes it to behave incorrectly, unexpectedly, or with undesirable results. The code compiles and runs but causes problems elsewhere, for example, giving incorrect information or mismanaging data.

A

logic errors

30
Q

Precise rules defining how the letters, words, and punctuation of a programming language are required to be used together.

A

syntax

31
Q

A mistake in the program that occurs during the execution of a program. Programming languages define their own run-time errors.

A

runtime error

32
Q

A designated stopping place in your code. Using a debugger, it lets you examine the state of the program and its variables.

A

breakpoint