Computer Security Flashcards

1
Q

the protection of computer systems and information from
harm, theft, and unauthorized use. It is the process of
preventing and detecting unauthorized use of your computer
system. There are various types of computer security which is
widely used to protect the valuable information of an
organization.

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is securing information from
unauthorized access, modification & deletion

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is securing an application by building
security features to prevent from Cyber Threats such as SQL
injection, DoS attacks, data breaches and etc.

A

Application Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

means securing a standalone machine
by keeping it updated and patched

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is by securing both the software and
hardware technology

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is defined as protecting computer systems,
which communicate over the computer networks

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the physical part of the computer, like the system
memory and disk drive.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

permanent software that is etched into a
hardware device’s nonvolatile memory and is mostly invisible to
the user.

A

Firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the programming that offers services, like
operating system, word processor, internet browser to the user.

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Computer security is mainly concerned with three main areas:

A

The CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is the concealment of information or resources. Also, there is
a need to keep information secret from other third parties that
want to have access to it, so just the right people can access
it.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is the trustworthiness of data in the systems or resources by
the point of view of preventing unauthorized and improper
changes.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

refers to the ability to access data of a resource when it is
needed, as such the information has value only if the
authorized people can access at right time. Denying
access to data nowadays has become a common attack.
Imagine a downtime of a live server how costly it can be.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

5 main technical controls

A

Firewalls
Secure Configuration
User Access Control
Malware Protection
Patch Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

can restrict network traffic and protect against
threats.

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly