IT Fundamentals Flashcards

1
Q

Availability =

A

ensures systems and information remain available for authorized users. making sure systems and data are accessible at the time users need them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity =

A

Protect against unauthorized changes to information. Insuring information is recorded, used and maintained in a way that ensures its: completeness, accuracy, internal consistency, and usefulness for a stated purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Confidentiality =

A

permitting authorized access while protecting against improper disclosure - protecting information and resources from unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Business Continuity Scope (3)

A
  • Activities (that will be covered)
  • Systems (that will be covered)
  • Controls (that will be implemented)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 main tools for availability

A

Redundancy and Fault Tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Redundancy =

A

ensuring a system can survive a single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RAID =

A

Redundant Arrays of Inexpensive Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disaster Recovery (4)

A

Contain the damage; assess the damage; come up with a plan; prioritize the restoration of the most critical systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

5 main threats to confidentiality:

A
  1. Snooping 2. Dumpster Diving 3. Eavesdropping 4. Wiretapping (electronic eavesdropping) 5. Social Engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

4 main integrity attacks:

A

1 Unauthorized Modification of Information 2 Impersonation 3 Man-in-the-Middle (MITM) 4 Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5 different types of events that can disrupt availability

A

1 Denial of Service (DDoS) Attacks 2 Power Outages 3 Hardware Failures 4 Destruction of Equipment 5 Service Outages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly