6.1.1 Data Privacy 6.1.2 Preventing Data Loss And Access Flashcards

1
Q

What does data privacy refer to?

A

Data privacy refers to safeguarding personal or sensitive information stored on a computer from being accessed by unauthorised parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do user accounts control access to?

A

Software updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary purpose of using passwords?

A

The primary purpose of passwords is to restrict access to data or systems by requiring authentication from authorised users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are strong passwords characterised by?

A

Strong passwords are characterised by complexity, including a mix of uppercase letters, lowercase letters, numbers, and special characters to enhance security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do digital signatures provide a way of identifying?

A

The location of the recipient’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary function of a firewall?

A

The primary function of a firewall is to prevent unauthorised access to data and systems by filtering incoming and outgoing network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does antivirus software do?

A

Constantly checks for virus attacks and removes or quarantines infected files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Constantly checks for virus attacks and removes or quarantines infected files

A

Anti-spyware software detects and removes spyware programs installed illegally on a user’s computer system, enhancing data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does encryption make virtually impossible without decryption keys?

A

Recovering lost files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What do biometric authentication methods rely on?

A

Biometric authentication methods rely on unique physiological or behavioural characteristics of individuals, such as fingerprints or voice patterns, for identity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which biometric method compares patterns of ‘ridges’ and ‘valleys’?

A

Fingerprint scans compare patterns of ‘ridges’ and ‘valleys’ unique to each individual’s fingerprint for authentication purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does retina scanning work?

A

Retina scanning uses infrared technology to capture the unique pattern of blood vessels in the retina, providing a highly secure method of biometric authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the accuracy rate of retina scans?

A

Retina scans have a high accuracy rate of approximately 1 in 1,000,000, making them extremely reliable for identity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the accuracy rate of fingerprint scans?

A

1 in 10,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly