Key Information Technology Terms
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following scenarios best illustrates the principle of 'Access Governance'?

  • Implementing a system that automatically revokes data access permissions for employees who have left the company. (correct)
  • Regularly backing up all organizational data to prevent data loss.
  • Installing the latest antivirus software on all company computers.
  • Conducting annual security awareness training for all employees.

An organization is developing a set of internal rules and guidelines regarding data handling and system usage. Which term best describes these efforts?

  • Disaster Recovery Plan
  • Authentication Protocol
  • Audit Trail
  • Administrative Control (correct)

A company experiences a sudden surge in network traffic that overwhelms its servers, leading to a complete system shutdown. This is an example of what?

  • Adverse Event (correct)
  • Successful Authentication
  • Data Encapsulation
  • Routine Maintenance

A security analyst is reviewing logs that document all actions performed by a specific user account over the past month. What is the analyst examining?

<p>Audit Trail (B)</p> Signup and view all the answers

Which of the following is the primary goal of 'Authentication' in a computer system?

<p>Verifying a user’s identity. (C)</p> Signup and view all the answers

A hospital needs to ensure its patient records system is accessible to doctors and nurses at all times, except during scheduled maintenance. Which security principle is most important here?

<p>Availability (D)</p> Signup and view all the answers

An unauthorized individual gains access to a database containing customers' social security numbers. What term describes this situation?

<p>Data Breach (C)</p> Signup and view all the answers

A small business wants to reduce IT costs and improve scalability. What would be the best approach?

<p>Switch to Cloud Computing (D)</p> Signup and view all the answers

A company is implementing a plan to restore its critical business functions after a hurricane. What kind of document are they using?

<p>Disaster Recovery Plan (A)</p> Signup and view all the answers

A software flaw allows an attacker to gain control of a server. What is this an example of?

<p>Exploit (C)</p> Signup and view all the answers

In the context of network communication, what is the primary function of a 'Logical Port'?

<p>To provide an address number for data transfer within communication links. (A)</p> Signup and view all the answers

Which layer of the TCP/IP model is responsible for determining how data is moved through a network?

<p>Network Interface Layer (D)</p> Signup and view all the answers

Which layer in the OSI model is responsible for converting data formats, such as handling JPEG or PNG file encoding?

<p>Presentation Layer (C)</p> Signup and view all the answers

What is the core principle behind 'Principle of Least Privilege' in cybersecurity?

<p>Granting users or programs only the minimum access necessary to perform their required tasks. (D)</p> Signup and view all the answers

Which of the following best describes 'Risk Transference' as a risk management strategy?

<p>Shifting the burden of a risk to another party, like an insurance company. (D)</p> Signup and view all the answers

What is the purpose of 'Segregation of Duties' in maintaining security and preventing fraud?

<p>To ensure no single person controls an entire high-risk transaction from beginning to end. (B)</p> Signup and view all the answers

A network administrator notices unusual traffic patterns and suspects a 'Side Channel' attack. What type of data might attackers be analyzing in this scenario?

<p>Power consumption, timing variations, or electromagnetic leaks from devices. (B)</p> Signup and view all the answers

An organization decides to continue operating a legacy system despite knowing its vulnerabilities because the cost of upgrading outweighs the potential impact of a breach. What risk treatment strategy are they employing?

<p>Risk Acceptance (C)</p> Signup and view all the answers

Which of the following most accurately describes the concept of a 'Zero Day' vulnerability?

<p>A previously unknown vulnerability that is actively being exploited by attackers. (B)</p> Signup and view all the answers

How might an organization apply 'Risk Mitigation' to a known vulnerability in their web application?

<p>By implementing a web application firewall (WAF) to filter malicious traffic. (A)</p> Signup and view all the answers

Flashcards

Logical Port

An address number used for data transfer in communication links.

Network Interface Layer

The layer determining how data moves through a network in TCP/IP.

OSI Model

A framework for interconnected computer systems.

Presentation Layer

The OSI layer that handles data format conversion (e.g., JPEG, PNG).

Signup and view all the flashcards

Principle of Least Privilege

Granting only the minimum access needed for users or programs.

Signup and view all the flashcards

Procedure

Detailed steps to complete a task, supporting policies.

Signup and view all the flashcards

Risk Assessment

Identifying, estimating, and prioritizing risks to an organization.

Signup and view all the flashcards

Risk Mitigation

Actions to prevent or reduce the impact of a risk.

Signup and view all the flashcards

Security Controls

Physical, technical, and administrative measures protecting info systems.

Signup and view all the flashcards

Vulnerability

A weakness in a system that can lead to to a security breach.

Signup and view all the flashcards

Access Governance

Managing risks from unnecessary data access.

Signup and view all the flashcards

Administrative Control

Directives for people in an organization; frameworks and standards.

Signup and view all the flashcards

Adverse Events

Negative events like system crashes or unauthorized access.

Signup and view all the flashcards

Audit Trail

Documentary evidence of activities in a system.

Signup and view all the flashcards

Authentication

Verifying a user’s identity.

Signup and view all the flashcards

Availability

Timely, reliable access to information and services for authorized users.

Signup and view all the flashcards

Breach

Loss of control or unauthorized disclosure of personal information.

Signup and view all the flashcards

Cloud Computing

Storing and processing data over the internet to improve efficiencies and reduce infrastructure costs.

Signup and view all the flashcards

Disaster Recovery Plan

Policies and procedures to recover critical functions after a disaster.

Signup and view all the flashcards

Firewall

A tool for managing and controlling network traffic.

Signup and view all the flashcards

Study Notes

  • Here are key Information Technology terms and definitions

Access Governance

  • Focuses on the management and reduction of risks associated with unnecessary data access.

Administrative Control

  • Include directives, guidelines and advisories for people within an organization.
  • It provides frameworks, constraints, and standards.

Adverse Events

  • Negative occurrences include system crashes, network packet floods, or unauthorized use of system privileges.

Audit Trail

  • Chronological records offer documentary evidence of activities in a program, workflow, or event.

Authentication

  • Verifies or proves a user’s identity.

Availability

  • Timely and reliable access to information and the ability to use it.
  • For authorized users, timely and reliable access to data and services

Breach

  • Loss of control, unauthorized disclosure, or acquisition of personally identifiable information.

Cloud Computing

  • Improves efficiencies and reduces infrastructure costs by storing and processing data over the internet.

De-Encapsulation

  • When data moves up the OSI model layers from Physical to Application

Disaster Recovery Plan

  • Encompasses policies and procedures to recover an organization’s critical functions after a disaster.

Encapsulation

  • Adding header and possibly footer (trailer) data by a protocol at a layer of the OSI model.

Endpoints

  • The ends of a network communication link.

Ethernet

  • A standard defining wired network connections and data formatting for communication.

Event

  • Any observable occurrence in a network or system.

Exploit

  • An attack that takes advantage of system vulnerabilities.

Firewall

  • Manages and controls network traffic to protect the network.

Infrastructure

  • Can be on-premises, in the cloud, or a hybrid of both.

Incident

  • An event that jeopardizes the confidentiality, integrity, or availability of information.

Integrity

  • The degree to which something is whole, complete, internally consistent, and correct.

Intrusion

  • A deliberate security event where an intruder gains unauthorized access to a system.

Logical Port

  • An address number used in communication links for transferring data.

Lower Layer

  • The media or transport layer is responsible for receiving bits from a physical connection.

Network Interface Layer

  • The layer in TCP/IP that determines how data moves through a network.

OSI Model

  • A standard communication framework for interconnected computer systems.

Presentation Layer

  • An OSI model layer is responsible for data format conversion, such as handling JPEG or PNG files.

Principle of Least Privilege

  • Permits only the minimum access necessary for users or programs.

Privacy

  • The right of individuals to control the distribution of their personal information.

Privileged Accounts

  • User accounts with higher access permissions, such as managers and administrators.

Procedure

  • Detailed steps are required to complete a task in support of policies.

Regulation

  • Laws, usually from the government, carrying financial penalties for noncompliance.

Risk

  • The measure of potential threats an entity may face.

Risk Acceptance

  • Choosing not to take action against a risk due to its negligible impact or outweighing benefits.

Risk Assessment

  • Identifying, estimating, and prioritizing risks to an organization’s operations.

Risk Avoidance

  • Attempting to eliminate a risk entirely, possibly by ceasing a particular activity.

Risk Mitigation

  • Taking actions to prevent or reduce the impact of a risk event.

Risk Transference

  • Passing a risk to another party, often through insurance.

Risk Treatment

  • Making decisions about the best actions regarding identified risks.

Security Controls

  • Physical, technical, and administrative safeguards to protect information systems.

Segregation of Duties

  • Ensuring no single person controls an entire high-risk transaction from start to finish.

Sensitivity

  • The importance assigned to information based on its need for protection.

Session Layer

  • An OSI model layer is responsible for managing network sessions, such as NetBIOS.

Side Channel

  • A passive, noninvasive attack using power monitoring, timing, or fault analysis.

SNMP (Simple Network Management Protocol)

  • Used for managing infrastructure devices via data exchange.

Switch

  • A wired network device that directs traffic to specific connected devices instead of broadcasting to all.

Technical Controls

  • Security controls implemented by computer systems and networks to prevent unauthorized access.

Threat

  • An entity aiming to exploit a vulnerability and bypass security.

Transport Layer

  • The TCP/IP layer that moves data between devices.

Upper Layer

  • Also called the host or application layer in network models.

Vulnerability

  • An inherent weakness in a system that could lead to a security breach.

Zero Day

  • A previously unknown vulnerability that hackers can exploit before detection or prevention.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Definitions for different IT related terms. The terms include Access Governance, Administrative Control, Adverse Events to name a few. These terms are important within the IT and security fields.

More Like This

Access Management CARF: 1.J.3.d.(1)
1 questions
ACCESS MANAGEMENT CARF: 1.J.3.d.(1)
1 questions
Memoria Computacional y Almacenamiento
48 questions
Use Quizgecko on...
Browser
Browser