Computer Security Fundamentals

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes the primary objective of computer security?

  • To ensure continuous technological innovation and advancement.
  • To promote open access and unrestricted sharing of digital information.
  • To preserve the integrity, availability, and confidentiality of information system resources. (correct)
  • To maximize the speed and efficiency of information processing.

What is the main motivation behind attacks targeting intellectual property?

  • To disrupt network services and cause widespread outages
  • To test the effectiveness of advanced intrusion detection systems.
  • To clone hardware for profit or leak sensitive information. (correct)
  • To develop new methods for securing digital communications.

Which type of malware disguises itself as beneficial software to deceive users?

  • Worm
  • Spyware
  • Trojan horse (correct)
  • Adware

What is the primary goal of a Disaster Recovery Plan (DRP)?

<p>To resume normal computing capabilities as quickly as possible after a disaster. (A)</p>
Signup and view all the answers

Which of the following describes a hypothetical attack that activates malicious code after a specific time or event?

<p>Time bomb (D)</p>
Signup and view all the answers

What is a botnet?

<p>A collection of computers infected with malware and controlled remotely. (C)</p>
Signup and view all the answers

Which of the following elements are included in the CIA triad?

<p>Confidentiality, Integrity, Availability (D)</p>
Signup and view all the answers

What is the primary purpose of malware?

<p>To harm or gain unauthorized access to a targeted computer. (A)</p>
Signup and view all the answers

Which activity is considered risk mitigation?

<p>Eliminating, reducing, or controlling risks. (D)</p>
Signup and view all the answers

What is the primary objective of risk management?

<p>To reduce risk to an acceptable level. (C)</p>
Signup and view all the answers

Which type of malware is primarily designed to display unwanted advertisements on a user's computer?

<p>Adware (C)</p>
Signup and view all the answers

What is a manufacturing backdoor in the context of hardware security?

<p>A secret entry point deliberately inserted into hardware during manufacturing. (C)</p>
Signup and view all the answers

Which of the following best describes the primary behavior of a worm?

<p>It actively seeks out more machines to infect and replicate itself. (D)</p>
Signup and view all the answers

What is the key characteristic of a phishing attack?

<p>Tricking individuals into revealing sensitive information via deceptive emails or messages. (A)</p>
Signup and view all the answers

What is the main purpose of ransomware?

<p>To deny or restrict access to files and demand payment for their release. (B)</p>
Signup and view all the answers

What is the primary goal of a distributed denial-of-service (DDoS) attack?

<p>To disrupt the availability of a server by overwhelming it with requests. (C)</p>
Signup and view all the answers

How does a virus typically spread?

<p>By infecting programs and modifying them to include a copy of the virus. (B)</p>
Signup and view all the answers

What is the distinguishing characteristic of a Trojan horse?

<p>Its disguise as a legitimate file or program. (D)</p>
Signup and view all the answers

What activity is characteristic of spyware?

<p>Secretly recording a user’s online activity without their knowledge. (B)</p>
Signup and view all the answers

What is the purpose of a Business Impact Analysis (BIA)?

<p>To evaluate the potential effects of an interruption to critical business operations. (A)</p>
Signup and view all the answers

Flashcards

Goal of Computer Security?

To preserve the integrity, availability, and confidentiality of information system resources.

Motivation for Intellectual Property Attacks?

To clone hardware or leak information.

Trojan Horse

A type of malware that poses as beneficial software.

Disaster Recovery Plan (DRP)

A plan to resume normal computing capabilities in as little time as possible after a disaster.

Signup and view all the flashcards

Time Bomb

A hypothetical attack that triggers malicious behavior after a predetermined amount of time.

Signup and view all the flashcards

Botnet

A collection of computers that are infected with malware and can be controlled remotely.

Signup and view all the flashcards

CIA Triad

Confidentiality, Integrity, Availability.

Signup and view all the flashcards

Malware

A specific set of codes or an application designed to harm or gain access to a targeted computer.

Signup and view all the flashcards

Risk Mitigation

The process of eliminating, reducing, or controlling risks.

Signup and view all the flashcards

Goal of Risk Management?

To reduce risk to an acceptable level.

Signup and view all the flashcards

Adware

A type of malware that serves pop-ups and display ads.

Signup and view all the flashcards

Common Hardware Attack?

Manufacturing backdoors.

Signup and view all the flashcards

Worm

A program that actively seeks out more machines to infect.

Signup and view all the flashcards

Phishing

A type of social engineering attack that involves sending emails or messages that appear to be from trusted sources.

Signup and view all the flashcards

Ransomware

A type of malware that denies or restricts access to your own files and demands payment.

Signup and view all the flashcards

Distributed Denial-of-Service Attack?

An attempt to stop a public server by overwhelming it with requests.

Signup and view all the flashcards

Virus

A piece of software that infects programs by modifying them to include a copy of the virus.

Signup and view all the flashcards

Trojan Horse?

A malicious program that disguises itself as a legitimate file.

Signup and view all the flashcards

Spyware

A type of malware that secretly records your online activity.

Signup and view all the flashcards

Purpose of Business Impact Analysis (BIA)?

To evaluate the potential effects of an interruption to critical business operations

Signup and view all the flashcards

Study Notes

  • Computer security's main objective is to maintain the confidentiality, integrity, and availability of information systems and resources.
  • Intellectual property attacks are often motivated by a desire to clone hardware or steal data.
  • A Trojan horse is a type of malware that appears to be helpful software.
  • A Disaster Recovery Plan (DRP) is designed to restore normal computing functions as quickly as possible after a disaster.
  • A time bomb is a type of attack that is pre-programmed to execute malicious actions after a set amount of time.
  • A botnet is a network of computers infected with malware that can be controlled remotely.
  • The CIA triad consists of Confidentiality, Integrity, and Availability.
  • Malware is a set of code or an application created to harm or gain unauthorized access to a computer.
  • Risk mitigation reduces, eliminates, or controls risks.
  • Risk management's primary goal is to lower risk to an acceptable level.
  • Adware is a kind of malware that shows pop-up and display advertisements.
  • Manufacturing backdoors are a common type of hardware attack.
  • A worm is a program that actively seeks out more computers to infect.
  • Phishing is a type of social engineering attack that uses deceptive emails or messages that appears to be from trusted sources.
  • Ransomware restricts access to files and demands payment.
  • A distributed denial-of-service attack attempts to overwhelm a public server with requests, rendering it unavailable.
  • A virus is a piece of software that replicates itself by inserting its code into other programs.
  • A Trojan horse is a malicious program disguised as a legitimate file.
  • Spyware secretly tracks online activity.
  • Using a risk register is the most typical method of risk management.
  • A slow, crashing, or freezing computer indicates a malware infection.
  • A hardware backdoor is a hardware flaw that permits unauthorized access.
  • A Business Impact Analysis (BIA) assesses the possible implications of a disruption to essential business operations.
  • A Business Continuity Plan (BCP) is a strategy for maintaining essential operations during and after unexpected events.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

INFOAS1 Midterm Reviewer PDF

More Like This

Use Quizgecko on...
Browser
Browser