Security Flashcards

1
Q

What is a threat in computer security?

A

A potential cause of an unwanted incident that may harm a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an attack?

A

An attempt to breach security by exploiting a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List three types of security violations.

A

Breach of confidentiality, breach of integrity, breach of availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Trojan horse?

A

A malicious program disguised as a legitimate application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a trap door?

A

An undocumented access point left in a program to bypass normal authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a logic bomb?

A

Code that triggers malicious activity when certain conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of encryption?

A

To convert plaintext into ciphertext to protect information from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Difference between symmetric and asymmetric encryption?

A

Symmetric uses the same key for encryption and decryption; asymmetric uses public and private keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does RSA encryption rely on?

A

The difficulty of factoring large prime numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a worm?

A

A standalone malware program that replicates itself to spread to other computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly