Lesson 2 Flashcards

1
Q

It is the most common option/format for teaching online. Click the image below to play the video clip, which summarizes the purpose of ____?.

is a software application designed to manage, deliver, and track educational courses, training programs, and learning and development programs.

A

Learning management system (LMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

often referred to as malware, are software designed to harm or disable computer systems without the owner’s knowledge.

A

Malicious programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the classes of malicious software?

A

Viruses, worms, Trojans, bots, and phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It encompasses a wide range of technologies, processes, and practices designed to safeguard sensitive information and ensure the confidentiality, integrity, and availability of data.

A

Cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two types of security threats?

A

Internal threats originate from within an organization, posing risks from authorized individuals who have access to sensitive information or systems.These threats can be intentional or unintentional, arising from

External threats originate from outside the organization, posing risks from unauthorized individuals or entities seeking to compromise systems, steal data, or disrupt operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three types of attackers?

A

Amateurs, hackers, and organized hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An internet based conflict that involves the penetration of computer systems and networks of other nations. This attackers have the resources and expertise to launch massive internet based attacks against other nations to cause damage or distract services, such as shutting down a power grid.

A

Cyber warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is the principle of keeping information secret and private, ensuring that it is only accessed by authorized individuals.

A

Confidentially

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

in the context of cybersecurity, refers to the assurance that data and information remain accurate, complete, and unaltered.It ensures that data has not been tampered with, corrupted, or modified in any unauthorized way.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

refers to the amount of time a device, service, or piece of infrastructure is usable or accessible.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Are the programs that browse documents for specified keywords and returns a list of the documents where the keywords were found

A

Search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the common types of search engines l

A
  • local
  • meta search engine
  • blog from blogs (web logs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly