Unit 10 : Digital Security Flashcards

1
Q

What is digital security risk?

A
  1. An event that could cause loss of or damage to a computer or mobile device hardware, software, data, informtion or processing capability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is computer crime?

A
  1. Any illegal act involving the use of a computer or related devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cybercrime?

A
  1. Online or Internet-based illegal act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What has a higher degree of security risk than information kept in organizations

A
  1. Information transmitted over networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What malware doesn’t replicate itself on other computers?

A
  1. Trojan Horse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a malware that hides within / looks like legitimate program?

A
  1. Trojan Horse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What malware copies itself repeadatedly, using up resources and possibly shutting doen computer or network?

A
  1. Worm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What malware is a potentially damaging computer program which can spread and damage files?

A
  1. Virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What malware is delivered when we open file, run infected program or boot computer with infected disk in disk drive?

A
  1. Payload
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List out the type of malware ( 7 )

A
  1. Adware
  2. Ransomware
  3. Rookit
  4. Spyware
  5. Trojan Horse
  6. Virus
  7. Worm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages, or other internet services

A
  1. Adware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a malware that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money

A
  1. Ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a malware that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device?

A
  1. Rootkit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a malware placed on a computer / mabile device without user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online?

A
  1. Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List out the internet and network attacks ( 5 )

A
  1. Botnet
  2. Zombie PC
  3. Denial of Service Attack ( DOS )
  4. Distributed DOS Attack
  5. Back Door
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What network attack is a group of compromised computers or mobile devices connected to a network

A
  1. Botnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What network attack is a compromised computer or device?

A
  1. Zombie PC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What network attack is disrupts computer access to an Internet Service ?

A
  1. Denial of Service Attack ( DOS )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What network attack is a larger scale or a DOS?

A
  1. Denial DOS Attack ( DDOS Attack )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What network attack is a program or set of instructions in a program that allow users to bypass security controls?

A
  1. Back Door
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What association assists with DDOS attacks?

A
  1. Computer Emergency Response Team Coordination Center ( CERT/CC )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does hacker uses to send an influx of confusing date messages to execute attack on other systems?

A
  1. Unsuspection computer, called zombies
23
Q

How does virus spread? ( 3 )

A
  1. Unscrumpulous programmers create a virus program. They hide the virus in a Word document and attach the Word document to an e-mail message
  2. They use the Internet to send the e-mail message to thousands of users around the world
  3. User open the attachment and their computers become infected with the virus
24
Q

What is a macro virus?

A
  1. Malicious code writen in word programs
25
Q

How to prevent macro virus? ( 2 )

A
  1. Set macro security level in applications that allow you to write macros
  2. At medium security level warning displays that a document contains a macro
26
Q

What is macros?

A
  1. Instructions saved in an application, such as word processing or spreadsheet program
27
Q

What is antivirus software originally developed to ?

A
  1. Detect and remove computer viruses
28
Q

What does antivirus also protects against?

A
  1. Worms
  2. Trojan Horses
29
Q

What is virus signature?

A
  1. Specific pattern of virus code
  2. The binary pattern of the machine code of a particlar virus
30
Q

What does Virus Signature also called as

A
  1. Virus Definition
31
Q

What is the usage of virus signature?

A
  1. Antivirus programs look for virus signatures to identfy the presence of a virus
32
Q

How does Antivirus finds and remove malware ? ( 5 )

A
  1. Uses information to detect if virus has tampered any files
  2. Records information about the files such as file size and creation
  3. Attempts to remove any detected virus
  4. Quarantines infected files that it cannot remove
  5. Keeps files in separate area of hard disk
33
Q

List out the preventive measures for preventing malware ( 8 )

A
  1. Never start a computer with a removable media ( USB , Flash Drive )
  2. Set the macro security in programs so you can enable or disable macros
  3. Install an antivirus program on all of your computers
  4. Never open e-mail attachment unless it is from a trusted source
  5. If the antivirus program flags an e-mail attachment as infected, delete the attachment immediately
  6. Check all downloaded programs for viruses, worms, or Trojan horses
  7. Installing a personal firewall
  8. Scan all removable media
34
Q

What leads to system failure? ( 6 )

A
  1. Prolonged malfunction of computer
  2. Noise - Unwanted electrical signal
  3. Undervoltage - drop in electrical supply
  4. Overvoltage / Power Surge
  5. Loss of hardware, software or data
35
Q

What causes system failure? ( 3 )

A
  1. Aging hardware
  2. Natural disasters
  3. Electrical Power Disturbances
36
Q

What serves a protector that provides power during power loss?

A
  1. Uninterruptible Power Supply ( UPS )
  • Protects computer and Equipment from electrical power disturbances
37
Q

What is digital signature?

A
  1. Encrypted code that a software attaches to an electronic message to verify the identity of the message sender
38
Q

What is a secure site?

A
  1. Website that uses encryption to secure data
39
Q

What is a digital certificate?

A
  1. A notice that guarantees a user or websites that is legitimate
40
Q

What authorized company issues and verifies digital certificates?

A
  1. Certificate Authority ( CA )
  • Verisign
  • User apply for digital certificate from CA
41
Q

What does digital certificate stores?

A
  1. User’s Name
  2. Issuing CA’s Name / Signature
  3. Serial Number of Certificate
  • It was encrypted
42
Q

What does Secure Socket Layer ( SSL ) does?

A
  1. Is a security protocol that encrypt all data that passes between client
43
Q

What is the web address indicate secure connections such as SSL?

A
  1. Https
44
Q

What does Secure Socket Layer ( SSL ) requires?

A
  1. Digital Cert
  • Prevents illegal tampering of data
45
Q

What does backup do?

A
  1. Process for duplicate file, program or disk
46
Q

What is the difference between Full Backup and Selective Backup?

A

1.Full Backup
- Backup all files in the computer
2. Selective Backup
- Select which files to back up

47
Q

What can backup prevents?

A
  1. In case of system failures or corrupted files, restore files by copying ro original location
48
Q

List out the all the disaster recovery plan

A
  1. Disaster Recovery Plan
  2. Emergency Plan
  3. Backup Plan
  4. Recovery Plan
  5. Test Plan
49
Q

What plan is a written plan for restoring computer operations in the event of a disaster?

A
  1. Disaster Recovery Plan
50
Q

What is the steps to be taken immediately after disaster

A
  1. Emergency Plan
51
Q

What determine that how backup files and equipment would be used to resume information processing?

A
  1. Backup Plan
52
Q

What is the actions to be taken to restore fill information processing operations?

A
  1. Revovery Plan
53
Q

What simulates various levels of disasters and records the ability to recover?

A
  1. Test Plan