CS 4 Flashcards

1
Q

What do SMS and MMS mean in telephony?

A

SMS sends texts; MMS sends media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the requirements of a 5G network in telecommunication?

A

High speed, low latency, and massive device connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between a SIM and an eSIM?

A

SIM is physical; eSIM is built-in and programmable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between CLIP and CLIR?

A

CLIP shows the caller ID; CLIR hides it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is physical security used along with computer security?

A

Protects both hardware and digital data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a threat and a vulnerability in computer security?

A

Threat is danger; vulnerability is weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can risk description facilitate security precautions in computer security?

A

Identifies potential threats and prepares defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who can determine restrictions on security solutions?

A

Restrictions on security solutions are determined by system administrators, security policies, or regulatory requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the elements and access controls of physical object security?

A

Elements of physical object security include barriers, locks, alarms, and surveillance systems. Access controls involve authentication (e.g., ID cards, biometrics) and authorization (e.g., permissions, role-based access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between authorization and authentication?

A

Authentication verifies identity; authorization grants access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can multi-factor authentication facilitate access control within computer security?

A

Adds extra security layers (e.g., password + fingerprint).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are denial of service attacks and distributed denial of service attacks?

A

DoS uses one source; DDoS uses multiple sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does phishing mean in computer security?

A

Tricking users into giving personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a firewall mean in IT security architecture?

A

Filters traffic to block harmful data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the cybersecurity roles in organizations?

A

Analyst, engineer, architect, administrator, and CISO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does GDPR mean in the European Union?

A

GDPR stands for General Data Protection Regulation, which protects data privacy in the EU.

17
Q

What does GDPR mean outside the European Union?

A

Outside the EU, GDPR applies to companies handling EU citizens’ data, ensuring privacy and protection.

18
Q

How can an organization’s business be affected if it violates GDPR?

A

Fines, reputational damage, and loss of trust.

19
Q

What is personal data?

A

Any information identifying a person (e.g., name, email).