Exam 1 Flashcards

1
Q

A weakness in a computer system

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A set of circumstances that could cause harm

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

when a bad actor exploits a vulnerability

A

attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an action, device, procedure, or technique that reduces a vulnerability

A

control/countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the ability of a system to ensure that an asset is only viewed by authorized parties

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the ability of a system to ensure that an asset can only be edited by authorized parties

A

integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the ability of a system to ensure that an asset can be accessed by all authorized parties

A

availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a systems full set of vulnerabilities, actual and potential

A

attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

authentication method: something a user knows

A

password, PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

authentication method: something a user is

A

finger print, face id

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

authentication method: something a user has

A

key fob, ID card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

incorrectly confirming an identity

A

false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a tool used by system administrators to see who accessed data or files on a server

A

access log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

managing user permissions w/ a set of lists (used by Linux and Unix)

A

Access Control Lists (ACL’s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

assigning permissions to users based on their jobs by creating groups

A

role-based access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

encoding a message

A

encryption

17
Q

breaking an encryption

A

decryption

18
Q

when a program exceeds the space allocated to it

A

buffer overflow

19
Q

type of program that can replicate itself by modifying other programs on the same computer

A

virus

20
Q

type of program that can replicate itself to other computers on the same network

A

worm

21
Q

most difficult passwords to hack

A
  • long strings
  • large characters sets
  • do not appear in the dictionary of words and phrases