Module 1 Flashcards

1
Q

What is confidentiality in computer security?

A

The concealment of information or resources to keep them secret from unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define integrity in the context of data security.

A

The trustworthiness of data by preventing unauthorized and improper changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does availability refer to in computer security?

A

The ability to access data or resources when needed by authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is unauthorized access?

A

Gaining access to a server, website, or sensitive data using someone else’s account details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who is considered a hacker?

A

A person who exploits computer systems for various reasons, such as money or social causes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a threat in cybersecurity?

A

An action or event that might compromise the security of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define vulnerability in the context of cybersecurity.

A

A weakness or design flaw in a system that can lead to security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an attack in cybersecurity?

A

An assault on system security delivered by a person or machine that violates security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of antivirus or antimalware software?

A

To prevent malicious software from infecting a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering?

A

A technique used by hackers to steal data through psychological manipulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a virus in computer security?

A

Malicious software that installs on a computer without consent for harmful purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a firewall?

A

Software or hardware used to filter network traffic based on predefined rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the best practices for password security.

A
  • Don’t share passwords
  • Don’t write them down
  • Change them often
  • Use hard-to-guess passwords
  • Use a large set of characters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is biometric identification?

A

A security method using unique physical characteristics, such as fingerprints or iris scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is cipher text?

A

The result of transforming an original message using encryption algorithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does public key encryption involve?

A

Using a public key to encrypt data and a private key to decrypt it.

17
Q

What is a Virtual Private Network (VPN)?

A

A service that extends a private network across a public network, securing data during transmission.

18
Q

What are common types of cyberattacks?

A
  • Distributed Denial of Service (DDoS)
  • Ransomware
19
Q

What is data encryption?

A

The process of converting data into a coded format to protect it from unauthorized access.

20
Q

What are the methods of data encryption?

A
  • Symmetric Encryption
  • Asymmetric Encryption
  • End-to-End Encryption
21
Q

What is a hash function?

A

A mathematical algorithm that converts input data into a fixed-size string, unique to that input.

22
Q

How is password storage typically handled?

A

Passwords are hashed and the resulting hash is stored in the database for verification.

23
Q

What is file verification?

A

The process of checking the hash value of a file to ensure its integrity.

24
Q

What are examples of widely used hash functions?

A
  • MD5
  • SHA-1
  • SHA-256
25
Q

What is the purpose of access control?

A

To verify user identities and regulate their access to data and resources.

26
Q

What are the access control methods?

A
  • Role-Based Access Control (RBAC)
  • Mandatory Access Control (MAC)
  • Discretionary Access Control (DAC)
27
Q

What is multi-factor authentication (MFA)?

A

An authentication method that requires two or more verification factors.

28
Q

True or False: Availability is one of the core principles of the CIA Triad.

A

True

29
Q

What are common causes of availability disruption?

A
  • Distributed Denial of Service (DDoS) attacks
  • Hardware failures
  • Natural disasters
30
Q

What methods can be used to ensure availability?

A
  • Redundancy
  • Disaster Recovery Plans
  • Load Balancing