extra questions computer security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is authentication?

A

Authentication is the process of verifying the identity of a person or device. Authentication system makes sure that right people enters the system and access the right information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the types of authentication?

A

Types of authentications:
1) Password
2) Biometric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are four criteria for keeping a strong password?

A

Any four criteria for strong password are:
1) Do not keep a password which can be easily guessed such as date of birth, nickname, etc.
2) Do not keep word as password that is currently popular.
3) Keep a password with mixture of alphabet and numbers which is difficult to guess.
4) Keep changing your password regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is cryptography?

A

Cryptography is a technique of securing information and communications through use of codes so that only those people for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the features of cryptography?

A

Features of Cryptography:
1) Confidentiality: Information can only be accessed by the person for whom it is intended.
2) Integrity: Information cannot be modified in storage or transition without detection.
3) Non-repudiation: The creator/sender cannot deny their intention to send information.
4) Authentication: The identities of sender and receiver are confirmed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encryption?

A

Encryption is a process which transforms the original information into an unrecognizable form. This new form of the message is entirely different from the original message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is decryption?

A

Decryption is a process of converting encoded/encrypted data into a form that is readable and understood by a human or a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Differentiate between encryption and decryption.

A

Differences:
1) Encryption converts normal data into an unreadable form; Decryption converts unreadable data into its original form.
2) Encryption is done by the sender; Decryption is done by the receiver.
3) The same algorithm with the same key is used for both processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Volt Guard?

A

A power protection device that provides constant output voltage to the computer system in case of high input voltage coming from the source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a UPS?

A

UPS is a battery supported power protection device which controls the electric voltage and supplies clean and continuous power to the computer system even during power failures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Spike Guard?

A

A device designed to protect electrical devices from voltage spikes. Automatically maintains a constant voltage level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Match Password with its definition.

A

Password: Secret word or phrase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Match Encryption with its definition.

A

Encryption: Scrambled and unreadable form of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Match Backup with its definition.

A

Backup: Duplicate copy of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Match Access Control with its definition.

A

Access Control: Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Match Antivirus with its definition.

A

Antivirus: Software to remove malicious programs.

17
Q

Match Keylogger with its definition.

A

Keylogger: Duplicating disk.

18
Q

Match Trojan with its definition.

A

Trojan: Malware Security threats.

19
Q

Match Firewall with its definition.

A

Firewall: Software that prevent gaining access.