Use tools to protect business operations Flashcards

1
Q

What is programming?

A

a process that can be used to create a specific set of instructions for a computer to execute tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is automation?

A

the use of technology to reduce human and manual effort in performing common and repetitive tasks. Automation also helps reduce the risk of human error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SQL used for?

A

SQL is used to create, interact with, and request information from a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a database?

A

A database is an organized collection of information or data. There can be millions of data points in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a data point?

A

data point is a specific piece of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an operating systems?

A

An operating system is the interface between computer hardware and the user. Linux®, macOS®, and Windows are operating systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Linux is an open source code. What does open source code mean?

A

Open source means that the code is available to the public and allows people to make contributions to improve the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Command meaning

A

A command is an instruction telling the computer to do something.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Command line meaning

A

A command-line interface is a text-based user interface that uses commands to interact with the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Web vulnerability meaning

A

A web vulnerability is a unique flaw in a web application that a threat actor could exploit by using malicious code or behavior, to allow unauthorized access, data theft, and malware deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Antivirus software meaning

A

Antivirus software is a software program used to prevent, detect, and eliminate malware and viruses. It is also called anti-malware. Depending on the type of antivirus software, it can scan the memory of a device to find patterns that indicate the presence of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Intrusion detection system (IDS) meaning

A

An IDS is an application that monitors system activity and alerts on possible intrusions. The system scans and analyzes network packets, which carry small amounts of data through a network. The small amount of data makes the detection process easier for an IDS to identify potential threats to sensitive data. Other occurrences an IDS might detect can include theft and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption meaning

A

Encryption makes data unreadable and difficult to decode for an unauthorized user; its main goal is to ensure confidentiality of private data. Encryption is the process of converting data from a readable format to a cryptographically encoded format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptographic encoding meaning

A

converting plaintext into secure cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Plaintext meaning

A

unencrypted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

secure ciphertext meaning

A

the result of encryption

17
Q

what is the purpose of encoding?

A

Encoding uses a public conversion algorithm to enable systems that use different data representations to share information.

18
Q

penetration testing/ pen testing meaning?

A

is the act of participating in a simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes. It is a thorough risk assessment that can evaluate and identify external and internal threats as well as weaknesses.