SOLUTIONS 100% CORRECT
◍ Administrative Controls. Answer: Security measures implemented
through policies and procedures
◍ Adverse Events. Answer: Negative consequences such as system
crashes or unauthorized access
◍ Application Programming Interface (API). Answer: Set of tools and
protocols for building software applications to access web-based
applications
◍ Application Server. Answer: Computer that hosts applications for
user workstations
◍ Artificial Intelligence. Answer: Computers and robots simulating
human intelligence and behavior
◍ Asset. Answer: Anything of value owned by an organization,
including tangible and intangible items
◍ Asymmetric Encryption. Answer: Encryption algorithm using
different keys for encryption and decryption
,◍ Audit. Answer: Independent review of records and activities to
assess system controls and compliance
◍ Authentication. Answer: Access control process verifying the
identity of a user or entity
◍ Authorization. Answer: Permission granted to a system entity to
access a resource
◍ Availability. Answer: Ensuring timely and reliable access to
information by authorized users
◍ Baseline. Answer: Documented lowest level of security
configuration allowed by a standard or organization
◍ Biometric. Answer: Biological characteristic used for
identification, such as fingerprint or iris pattern
◍ Bit. Answer: Most essential representation of data (0 or 1) at Layer
1 of the OSI model
◍ Bot. Answer: Malicious code acting as a remotely controlled 'robot'
for an attacker
, ◍ Breach. Answer: Loss of control or unauthorized access to
personally identifiable information
◍ Broadcast Transmission. Answer: Sending internet traffic to
multiple recipients
◍ Business Continuity (BC). Answer: Actions and tools to ensure
critical operations during a contingency
◍ Business Continuity Plan (BCP). Answer: Instructions for
sustaining critical business processes during and after a disruption
◍ Business Impact Analysis (BIA). Answer: Analysis of system
requirements and functions to prioritize contingency requirements
◍ Byte. Answer: Unit of digital information consisting of 8 bits
◍ Checksum. Answer: Digit representing the sum of correct digits in
digital data for error detection
◍ Ciphertext. Answer: Altered form of a plaintext message,
unreadable without decryption
◍ Classification. Answer: Identifying the degree of harm if
information is divulged to an unauthorized person