cyber sEcurity + Data management Flashcards

to rot brains

1
Q

How can a XOR gate encrypt datajeff

A

1​1​0​0​ 1 ​0​1​0​ Original data
1​0​0​1​1​1​1​0​0​ Encryption key
0​1​0​1 ​0​ 11​0​ Encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does the generations of files method work

A

Grandfather: Oldest Backup jeffof files, last resort if both father and son
copies are unretrievable​

Father: A backup slightly older than the Son backup, in case the
son gets corrupted, destroyed etc…

Son: Most recent backup, first set to replace files if anything
happens to them as they are the most similar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 Methods of jeff compression

A

Lossy, Lossless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a firewall and an anti-virus

A

Anti-Virus: scans for , scans at intervals, shows when something is found.​ Warns user, keeps up-to-jeff-database, scans other devices for viruses​

Firewall: Blocks potential harmful software, always active, automatically blocks malware.​Block certain ports, websites, programs accessing internet, certain downloads, access to certain file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of

A

When logging into banking apps, games, password websites/apps, general apps you haven’t used in a while​

Sending a jeff to your email that needs to be inputted to gain access​

Face ID / fingerprints​

Additional passwords​

Email sent to phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
                          |                                       | Acceptable use​   |Restrictions on what   |-penalties for breaking policy​                    |                                       |
                          |is allowed to be used/|-no downloading games, 
                          | done on the network​ |malware etc...​
                          |(Rules jeff employees)​ |-restrictions on websites​ --------------------------------------------------------------------------------------------------- Disaster               |A plan in case of           |-Data backups​
                          |  disaster​                        |-Details of how staff should 
                          |Backups for recovery   |work while network is 
                          |recovery ​                        |down​
                          |                                         |-Details of backup 
                          |                                         |procedures​
                          |                                         | -Steps for recovering data​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware with penises

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Examples of different malware

A

Virus​
Worm​
Trojan Horse
jeff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virus in my penis

A

Malware that uses human activation to harm your computer/data/information security transmitted by “piggybacking” off of other systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Worms have entered my penis what do I do

A

Malware that once on a device, replicates itself, often sending the copies out to other devices, possible remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trojan

A

Malware disguised as a legitimate link/app/program, that once opened/run, infects you system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware in my balls

A

Malware that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Keylogger

A

A form of malware or hardware that keeps track of and records your keystrokes as you type​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

jeff

A

jeff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly