Chapter 1 Lesson 2 Part 1 Flashcards

(13 cards)

1
Q

What are preventive measures?

A

Measures implemented to stop incidents before they occur

Focus on minimizing risk of unauthorized access and protecting sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an example of a preventive measure?

A

Firewall

Only authorized can enter, filtering incoming and outgoing traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a strong password and access control?

A

Fortified gate with complex lock

Ensures that only authorized users can access sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does data encryption do?

A

Secret message only authorized individuals can decipher

Protects sensitive data from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of security awareness training?

A

Raising awareness about phishing scams and other security risks

Helps users recognize and respond to security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are deterrent measures?

A

Measures designed to discourage potential threats

Aimed at preventing unauthorized access through intimidation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of a deterrent measure?

A

Security Cameras and Alarms

Discourage individuals from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an Intrusion Detection System?

A

Digital security guard for network systems

Monitors network traffic for suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of security awareness posters and messages?

A

Constant reminder to users of the importance of security practices

Reinforces security protocols within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are detective measures?

A

Measures that focus on detecting security incidents

Aimed at identifying and responding to security breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is log monitoring?

A

Reviewing a detailed record of everything in a system

Detects anomalies such as multiple failed login attempts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are vulnerability assessments?

A

Systematically scanning systems to identify weaknesses attackers might exploit

Essential for maintaining the security of computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of antivirus and antimalware?

A

Guards inspecting incoming files for danger

Quarantine or remove threats before they can cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly