CYBER SECURITY REVISED QUESTIONS AND ANSWERS#18
Access management - correct answer Managing the access to a computer system/network. It
includes procedures such as account administration, account maintenance, account monitoring
and the revocation of an account.
Account lockout - correct answer A software security method performed by operating system
software that locks any account when a user fails a login attempt more than a set number of
times. For example, system software can be set up to lock an account for several hours if the
user fails the login three consecutive times in a set time frame.
Anti-malware - correct answer Software designed to prevent, detect and eradicate malicious
software, such as a virus or a worm
Anomaly based - correct answer Software that is designed to detect computer intrusions and
misuse by monitoring system activity and classifying it as either normal or anomalous.
Asset - correct answer Something that is of value to a person, an organisation or a state, e.g.
Data, finance and secrets that should be secured against cyber security incidents.
Attacker - correct answer Individuals or organisations that target computer systems/networks
illegally.
Audit trail - correct answer A record of activities on a computer system/network, for example, a
record of modifications to data or access to parts of a system/network.
Availability - correct answer Data/information stored on a computer system/network must be
available to authorised users and organisations and be protected from unauthorised deletion.
Biometric access - correct answer Access to a computer system/network using technologies
that measure and analyse human body characteristics for authentication purposes, such as
DNA, fingerprints, retinas, voice patterns, facial patterns and hand measurements.
, Botnet - correct answer A network of computers infected with malicious software and
controlled without the owners' knowledge, for example, to send spam or hoax emails.
Business continuity plan - correct answer A plan to continue operations that an organisation will
follow if it is affected by a cyber security incident
Confidentiality - correct answer Information stored on a computer system/network must be
protected against unintended or unauthorised access. Data confidentiality is a measure of the
ability of a system to protect its data.
Cyber criminal - correct answer An individual who commits illegal activities using computers
and the Internet.
Cyber dependant - correct answer Illegal activities dependent on the use of computers and the
Internet, such as hacking or the distribution of malware on a network.
Cyber enabled - correct answer Illegal activities that could be undertaken without the use of
computers, such as fraud but that are enabled by the use of computers, such as fraudulently
obtaining money for goods online.
Cyber security - correct answer Refers to technologies, processes and practices designed to
protect computers, networks, software and data from attack, damage or unauthorised access
and aims to protect data confidentiality, integrity and availability.
Cyber security incident - correct answer An unwanted/unexpected event, such as an intrusion
into a computer system/network, such as the spread of malware.
Cyber security incident report - correct answer A report that documents the details of a cyber
security incident, such as the type of incident, when it occurred, how it was performed, etc.
Access management - correct answer Managing the access to a computer system/network. It
includes procedures such as account administration, account maintenance, account monitoring
and the revocation of an account.
Account lockout - correct answer A software security method performed by operating system
software that locks any account when a user fails a login attempt more than a set number of
times. For example, system software can be set up to lock an account for several hours if the
user fails the login three consecutive times in a set time frame.
Anti-malware - correct answer Software designed to prevent, detect and eradicate malicious
software, such as a virus or a worm
Anomaly based - correct answer Software that is designed to detect computer intrusions and
misuse by monitoring system activity and classifying it as either normal or anomalous.
Asset - correct answer Something that is of value to a person, an organisation or a state, e.g.
Data, finance and secrets that should be secured against cyber security incidents.
Attacker - correct answer Individuals or organisations that target computer systems/networks
illegally.
Audit trail - correct answer A record of activities on a computer system/network, for example, a
record of modifications to data or access to parts of a system/network.
Availability - correct answer Data/information stored on a computer system/network must be
available to authorised users and organisations and be protected from unauthorised deletion.
Biometric access - correct answer Access to a computer system/network using technologies
that measure and analyse human body characteristics for authentication purposes, such as
DNA, fingerprints, retinas, voice patterns, facial patterns and hand measurements.
, Botnet - correct answer A network of computers infected with malicious software and
controlled without the owners' knowledge, for example, to send spam or hoax emails.
Business continuity plan - correct answer A plan to continue operations that an organisation will
follow if it is affected by a cyber security incident
Confidentiality - correct answer Information stored on a computer system/network must be
protected against unintended or unauthorised access. Data confidentiality is a measure of the
ability of a system to protect its data.
Cyber criminal - correct answer An individual who commits illegal activities using computers
and the Internet.
Cyber dependant - correct answer Illegal activities dependent on the use of computers and the
Internet, such as hacking or the distribution of malware on a network.
Cyber enabled - correct answer Illegal activities that could be undertaken without the use of
computers, such as fraud but that are enabled by the use of computers, such as fraudulently
obtaining money for goods online.
Cyber security - correct answer Refers to technologies, processes and practices designed to
protect computers, networks, software and data from attack, damage or unauthorised access
and aims to protect data confidentiality, integrity and availability.
Cyber security incident - correct answer An unwanted/unexpected event, such as an intrusion
into a computer system/network, such as the spread of malware.
Cyber security incident report - correct answer A report that documents the details of a cyber
security incident, such as the type of incident, when it occurred, how it was performed, etc.