Unauthorized Access and Use Flashcards

1
Q

Involves using computers or networks without permission.

A

Unauthorized Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pertains to employing resources for unapproved or illegal activities.

A

Unauthotized Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The use of a computer or its data for unapproved or possibly illegal activities

A

Unauthorized Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Regulating who, when, and how resources can be accessed.

A

Access Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Logging successful and unsuccessful access attempts.

A

Audit Trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The computer, device, or network should maintain an audit trail that records in a file both successful and unsuccessful access attempts

A

– User name
– Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication Methods: Basic credentials for verifying user identity.

A

Usernames and Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Longer, complex password alternatives using words and punctuation.

A

Passphrases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources

A

Passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sometimes called a passcode, is a numeric password, either assigned by a company or selected by a user

A

PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the full acronym name of PIN?

A

personal identification number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

any item that you must possess, or carry with you, in order to gain access to a computer or computer facility

A

Possessed Object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic

A

Biometric device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Utilizing unique physical traits (e.g., fingerprints) for authentication.

A

Biometric device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical items (e.g., key cards) required for access.

A

Possessed Objects

17
Q

Enhanced security requiring two distinct authentication methods.

A

Two-Step Verification

18
Q

Investigating and analyzing digital evidence for legal or security purposes.

A

Digital Forensics

19
Q

Uses two separate methods, one after the next, to verify the identity of a user

A

Two-step verification

20
Q

The discovery, collection, and analysis of evidence found on computers and networks

A

Digital forensics