tools to protect business operations Flashcards

(11 cards)

1
Q

Programming

A

process that can be used to create a specific set of instructions for a computer to execute tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Automation

A

use of technology to reduce human and manual effort in performing common and repetitive tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Structured Query Language (SQL)

A

used to create, interact with, and request information from a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

database

A

organized collection of information or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

operating system

A

the interface between computer hardware and the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Web vulnerability

A

a unique flaw in a web application that a threat actor could exploit by using malicious code or behavior, to allow unauthorized access, data theft, and malware deployment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Antivirus software

A

software program used to prevent, detect, and eliminate malware and viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

intrusion detection system (IDS)

A

an application that monitors system activity and alerts on possible intrusions. The system scans and analyzes network packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption

A

the process of converting data from a readable format to a cryptographically encoded format. Encryption makes data unreadable and difficult to decode for an unauthorized user; its main goal is to ensure confidentiality of private data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptographic encoding

A

converting plaintext into secure ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Penetration testing

A

also called pen testing, is the act of participating in a simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly