Overview Exam 2025 Questions and
Answers 100% Pass
Data - ✔✔Digital Building Blocks
Information - ✔✔Processed data conveying specific meaning, & of substantial value.
Personal Data - ✔✔Minor personal details that can lead to susceptibility to financial,
emotional & physical damage.
Organizational Data - ✔✔Information belonging to commercial entities.
Commercial Data Breach - ✔✔Impacts include financial value, market value, credibility,
time loss, and costs.
Natural Threats - ✔✔Natural disasters / accidents; human conflict, earthquakes, fire,
lightning, floods, tornadoes, & hurricanes.
User Error - ✔✔The biggest threat to data, stemming from ignorance or accidental
lapses.
Data Predators - ✔✔Individuals or entities that exploit personal information of value in
the digital age.
COPYRIGHT © 2025 BY GRACE AMELIA, ALL RIGHTS RESERVED 1
,Data Security - ✔✔Process of protecting information, & the infrastructure storing it,
from unauthorized access / misuse.
Zombies - ✔✔Compromised computer used to launch attacks.
Confidentiality - ✔✔Concept of being known / accessible to ONLY Authorized Users.
Integrity - ✔✔Ensuring info is accurate, complete, reliable, & is in its original form.
Authenticity - ✔✔Ensures claimed source of Data is actually original source and not
tampered with since creation.
Availability - ✔✔Ensures user access to data at any point of time.
Nonrepudiation - ✔✔Ensures sender cannot deny having sent the message & the
recipient cannot deny having received it.
Financial Loss - ✔✔Loss due to systems being unavailable, affecting sensitive data or
bank/credit card info.
Identity Theft - ✔✔Process of stealing personal info with intent to use illegally.
Identity Fraud - ✔✔Actual usage of stolen PII in illegal activities.
Data Loss / Theft - ✔✔Public release causing organization or individual damage to
reputation.
Misuse of Computer Resources - ✔✔Higher performance & faster internet leading to
reduced security.
Precaution - ✔✔Action taken in advance to protect the system against threats.
Maintenance - ✔✔Actions supporting precautionary measures & securing devices.
Reaction - ✔✔Anticipation & planning measures to restore services after an incident.
COPYRIGHT © 2025 BY GRACE AMELIA, ALL RIGHTS RESERVED 2
, Potential Losses Due to Security Attacks - ✔✔Includes financial losses, unavailability of
resources, identity theft, loss of trust, data theft, & misuse of computer resources.
Potential losses due to security attacks - ✔✔Financial losses, Unavailability of
Resources, Identity Theft, Loss of Trust, Data Theft, & Misuse of Computer Resources.
Operating System (OS) - ✔✔Software program; designed to control all functions of both
the hardware & software of a computing device (Computer CANNOT Function w/o
OS).
OS Security - ✔✔Steps & Measures taken to protect an OS from Viruses, Threats,
Malware, & Hacking.
Malware - ✔✔Contraction for Malicious software; created w/ intent of damage /
control / steal info.
Virus - ✔✔Malicious code; spread rapidly by attaching themselves to various programs
and replicating when the program is run.
Trojan - ✔✔Destructive program; designed to pose as a legitimate app/program.
Worm - ✔✔[Most common Type of malware] Program; designed to enter an OS w/ the
intention of spreading Malicious code.
Spyware - ✔✔Malware; designed to spy on activity w/o User knowledge.
Ransomware - ✔✔Malware; designed to prevent users from accessing their computer
system.
Rootkit - ✔✔Malicious software; designed to remotely access / control w/o alerting
User/Security program.
Antivirus - ✔✔Software application that detects & eradicates malware from a computer
system.
COPYRIGHT © 2025 BY GRACE AMELIA, ALL RIGHTS RESERVED 3