Lesson 2 Flashcards

(8 cards)

1
Q

Is the act of verifying a claim of identity and is one of the primary techniques of separation used in computer security.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a duplicate copy of all the important computer files that are kept in another separate location

A

Data Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

shield access to internal network services, and block certain kinds of attacks through packet filtering.

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

serves as a gatekeeper functionality that protects intranets and other computer networks from intrusion by providing a filter and safe transfer point for access to and from the
Internet and other networks.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It is a system designed to detect network attacks in-progress and assist in post-attack forensics. It can scan a network for people that are on the network but who should not be there or are doing things that they should not be doing,

A

Intrusion Detection Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It search for virus signatures or use algorithmic detection methods to identify known virus. When a virus is found it removes or quarantines it.

A

Antivirus Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

reflects measures taken throughout the software development Life Cycle ( SDLC) to prevent flaws in computer code or operating system vulnerabilities introducedduring the design, development or deployment of an application.

A

Program Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is the practice of developing computer software in
a way that guards against the introduction of security vulnerabilities.

A

Security Coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly