1/22
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Q. What is Information Security?
Protection of an automated information system to maintain integrity, availability, and confidentiality of information system resources.
Q. What is Network Security?
Activities designed to protect the usability and integrity of a network and data, managing access and preventing threats from spreading.
Q. Which of the following is not part of network security?
managing access
Protecting usability
Printing documents
Stopping threats from spreading
Printing documents
Q. What does CIA stand for?
Confidentiality, Integrity, and Availability.
Q. Define Confidentiality.
Protection of information from unauthorized access or disclosure.
Q. Define Integrity.
Maintaining accuracy and consistency of information unless authorized changes are made.
Q. Define Availability.
Ensuring information is accessible when and where it’s needed.
Q. A system allowing unauthorized users to view data violates which CIA element?
Confidentiality
Q. A server crash that prevents data access affects what?
Availability
Q. Define Risk.
The potential for loss or damage when a threat exploits a vulnerability. (Risk = Threat × Vulnerability)
Q. Define Threat.
Anything that can exploit a vulnerability and cause harm (natural, unintentional, or intentional).
Q. Define Vulnerability.
A weakness in a system or device that can be exploited by attackers.
Q. Define Attack.
An intentional attempt to cause damage or gain unauthorized access.
Q. What are common attack vectors?
Network, User, Email, Web Application, Remote Access, Mobile.
Q. Types of Attacks?
Passive, Active, Insider, Outsider.
Q. Formula Risk?
Risk = Threat × Vulnerability
Q. Define Authentication.
The process of verifying identity (e.g., username & password).
Q. Define Authorization.
Granting permission to specific resources or actions.
Q. Define Access Control.
Policies that restrict access to information or locations.
Q. What does AAA stand for in security?
Authentication, Authorization, and Access Control
Q. Checking a user’s password is an example of:
Authentication
Q. Allowing access to only certain rooms represents:
Authorization