Questions and Answers (Latest Update
2024)
Assuring that messages and information are available only to
those who are authorized to view them - Correct Answer
✅Confidentiality
Ensuring that the data being sent/received hasn't been
tampered with - Correct Answer ✅Integrity
Information or applications being readily available for use -
Correct Answer ✅Availability
(Digital) proof that an action took place between, so you can
not deny that it happened. Proof could include audit logs -
Correct Answer ✅Non-repudiation
The opportunity for an attacker to attack your system (It's
possible that someone could break into your house through a
window) - Correct Answer ✅Threat
,ITS Network Security Study Guide Exam
Questions and Answers (Latest Update
2024)
The potential damage that an attack can have on your
system (If someone breaks through your window, you may
need to replace it) - Correct Answer ✅Risk
An unsecured area in your system that can be exploited
(Leaving the window open) - Correct Answer ✅Vulnerability
Providing only the minimum amount of privileges necessary
to perform a job or function - Correct Answer ✅Least
Privilege
This can include having lights, fences or cameras on a
building - Correct Answer ✅Site security
The protection of a computer system (and it's network) and
its confidentiality, integrity and availability. This can include
physically protecting your computer from removable devices
or digitally protecting your computer from different attacks -
Correct Answer ✅Computer Security
,ITS Network Security Study Guide Exam
Questions and Answers (Latest Update
2024)
This can include CD's or USB's, which can pose a threat when
someone sticks a malicious USB into their computer -
Correct Answer ✅Removable devices
Two doors on either side of a room, a person may gain access
to one but not the next. Meant to physically trap an attacker
and prevent them from leaving/entering the building -
Correct Answer ✅Mantraps
Procedures implemented to define the roles, responsibilities,
and administrative functions. This can include creating
policies and user training - Correct Answer
✅Administrative controls
An attack that occurs when a process attempts to store data
in RAM beyond the boundaries of the fixed-length - Correct
Answer ✅Buffer overflow
A computer program incorrectly manages memory
allocations; data gets created, but never deleted. - Correct
Answer ✅Memory leak
, ITS Network Security Study Guide Exam
Questions and Answers (Latest Update
2024)
Can cause certain applications to stop working or function
differently, and they require a host to replicate - Correct
Answer ✅Viruses
Typically traveling through networks, they cause your
computer to act slower and don't require a host to replicate
themselves - Correct Answer ✅Worms
A program disguised to perform a certain tasks when really it
can take control over your computer - Correct Answer
✅Trojan horses
A type of software that collects information about you without
your knowledge - Correct Answer ✅Spyware
An attack designed to lock you out of your computer system
until a sum of money is paid - Correct Answer
✅Ransomware