What are file permissions?
Settings on files and folders that determine which users can access them and how.
What are the types of file permissions?
Read only – open and view files.
Read and write – open, view, and edit files.
Full control – open, view, edit, modify, delete, and rename files.
Difference between edit and modify?
Edit: Change the content inside a file.
Modify: Change the content and extra actions like renaming or deleting the file.
What threats do file permissions protect against?
Malware, hacking, and accidental deletion.
What is access level?
Permissions assigned to a user profile that determine access to software, data, and services.
Difference between basic access and admin access?
Basic: Access limited files/folders and some software.
Admin: Full control of files/folders, can alter permissions, install or delete software.
How does access level protect data?
Restricts software installation and reduces risk of malware entering the system.
What is a backup and why is it important?
Copying data to a secondary location to prevent data loss in case of damage or corruption.
Types of backups?
Full backup: Complete backup of all data.
Incremental: Only backs up data changed since last backup.
Differential: Backs up data changed since last full backup.
How do passwords protect data?
Prevent unauthorized access to systems and software; strong passwords resist hacking.
Features of a strong password?
What is physical access control?
Measures to control physical access to IT systems and buildings, preventing theft, malware loading, or unauthorized access.
Types of physical access control?
**What are digital certificates?
Public key certificates that authenticate a user and allow secure encryption using Public Key Infrastructure (PKI).
What does a digital certificate contain?
What are protocols in networking?
Set of rules for transmitting data between devices over a network.
Examples of secure protocols?
SSL (Secure Sockets Layer), TLS (Transport Layer Security)
How do protocols and digital certificates protect data?
Prevent data interception, sniffing, and spoofing attacks; ensure secure communication (e.g., HTTPS).