2 - Protecting Data Technique Flashcards

(18 cards)

1
Q

What are file permissions?

A

Settings on files and folders that determine which users can access them and how.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the types of file permissions?

A

Read only – open and view files.
Read and write – open, view, and edit files.
Full control – open, view, edit, modify, delete, and rename files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between edit and modify?

A

Edit: Change the content inside a file.

Modify: Change the content and extra actions like renaming or deleting the file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What threats do file permissions protect against?

A

Malware, hacking, and accidental deletion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is access level?

A

Permissions assigned to a user profile that determine access to software, data, and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Difference between basic access and admin access?

A

Basic: Access limited files/folders and some software.

Admin: Full control of files/folders, can alter permissions, install or delete software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does access level protect data?

A

Restricts software installation and reduces risk of malware entering the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a backup and why is it important?

A

Copying data to a secondary location to prevent data loss in case of damage or corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of backups?

A

Full backup: Complete backup of all data.

Incremental: Only backs up data changed since last backup.

Differential: Backs up data changed since last full backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do passwords protect data?

A

Prevent unauthorized access to systems and software; strong passwords resist hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Features of a strong password?

A
  • At least 10 characters
  • Contains uppercase letters and numbers
  • Not reused across multiple accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is physical access control?

A

Measures to control physical access to IT systems and buildings, preventing theft, malware loading, or unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of physical access control?

A
  • Access cards – identification for entry
  • Keypad access – PIN-controlled entry
  • Biometric access – fingerprint, face, or iris recognition
  • Electronic locks – used in all above methods
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

**What are digital certificates?

A

Public key certificates that authenticate a user and allow secure encryption using Public Key Infrastructure (PKI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does a digital certificate contain?

A
  • Digital signature (verifies sender)
  • Public key (encrypts data)
  • Usernames and passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are protocols in networking?

A

Set of rules for transmitting data between devices over a network.

17
Q

Examples of secure protocols?

A

SSL (Secure Sockets Layer), TLS (Transport Layer Security)

18
Q

How do protocols and digital certificates protect data?

A

Prevent data interception, sniffing, and spoofing attacks; ensure secure communication (e.g., HTTPS).