Midterm Lesson 2 Flashcards

1
Q

It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to be.

A

It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A typical method for authentication over internet is via _______ and ________.

A

username; password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is a password which can be used one time only and is sent to the user as an SMS or an email at the mobile number/email address that they have specified during the registration process.

A

One Time Password (OTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is known as two-factor authentication method and requires two type of evidence to authentication an individual to provide an extra layer of security for authentication. Some other popular techniques for two-way authentication are: biometric data, physical token, etc. which are used in conjunction with username and password.

A

One Time Password (OTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is a technique to convert the data in unreadable form before transmitting it over the internet. Only the person who have the access to the key and convert it in the readable form and read it.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To avoid the transfer of key a method called ________, also known as public key encryption, is used.

A

asymmetric key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is a technique for validation of data. Validation is a process of certifying the content of a document.

A

Digital Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The __________ is created by encrypting the data with the private key of the sender.

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A special program called an _______ is used which is designed to protect the system against virus. It not only prevents the malicious code to enter the system but also detects and destroys the malicious code that is already installed into the system.

A

anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It is a hardware/software which acts as a shield between an organization’s network and the internet and protects it from the threats like virus, malware, hackers, etc. It can be used to limit the persons who can have access to your network and send information to you.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

There are two type of traffic in an organization: ________ traffic and _____ traffic.

A

inbound traffic and outbound traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Example of this are routers through which the network is connected to the network outside the organization i.e. Internet.

A

hardware firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These firewalls are installed and installed on the server and client machines and it acts as a gateway to the organizations‟ network.

A

Software Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

All the outbound traffic is routed through proxies for monitoring and controlling the packet that are routed out of the organization.

A

Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Based on the rules defined in the policies each packet is filtered by their type, port information, and source & destination information.

A

Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rather than going through all the field of a packet, key features are defined. The outgoing/incoming packets are judged based on those defined characteristics only.

A

Stateful Inspection

17
Q

It is a technique of hiding secret messages in a document file, image file, and program or protocol etc. such that the embedded message is invisible and can be retrieved using special software.

A

Steganography

18
Q

True or False:
In steganography, only the sender and the receiver know about the existence of the secret message in the image. The advantage of this technique is that these files are not easily suspected.

A

True

19
Q

The _______ acts as a fundamental system in case of a mishap where data is inadvertently lost or corrupted from original system.

A

backup system

20
Q

It involves a set of policies and procedures to preserve continuation of business in case of a disaster.

A

Disaster recovery

21
Q

A ______ may refer to a natural hazard or due to manual error or machine failure.

A

disaster

22
Q

Methods on Backup and DR of data:

Data is backed up on a full-scale and recovered back from the same.

A

Full back up

23
Q

Methods on Backup and DR of data:

Only changed or newly added data is backed up subsequently after the last full or incremental backup. Recovery is made with help of last full backup and all incremental backups performed everyday from the date of last full backup.

A

Incremental backup

24
Q

Methods on Backup and DR of data:

Only changed or newly added data is backed up subsequently after last full or differential backup but changes made in the previous differential backup are updated in next differential backup. This makes recovery process easier, which only requires data from last full backup and last differential backup copies

A

Differential backup

25
Q
A