GCSE paper Qs Flashcards

1
Q

Why must sound be converted into a digital format?

A

Computer systems use binary/ones and zeros/voltage on or off;
Sound is analogue/continuous/wave;
Computers use discrete values;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe blagging, phishing and shouldering?

A
  • blagging = victim tricked into giving details
  • phishing = victim receives communication from an unknown source - but is a fraud
  • watches someone enter their password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you prevent infections from malware and the damage caused by malware?

A

– Pen testing. To allow the organisation to understand where weaknesses may be, in order to strengthen their
system security
- Regularly back up data so that you can restore data that has been accidentally deleted or destroyed
and test backups.
- Ensure software is up to date. = Make sure all software is up to date and patched to prevent any exploitation of known vulnerabilities.
- Anti-virus/ Anti malware is up to date. Ensure anti-virus automatically updates so that the latest vulnerabilities are detected and dealt with.
- Manage the use of privileged accounts and access levels to files. - Controlling the access to files should act as an internal firewall\barrier to prevent unauthorised
access or execution of programs.
- Use network filtering or a firewall. = Prevent\block access into and out of the network using filtering and firewall to stop any malicious communications or transfer of viruses.
- MAC address filtering. Can prevent access by unauthorised devices.
- User training. To educate staff on the dangers of social engineering techniques and other unsafe practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is an image represented in a bitmap?

A
  • Image is divided into pixels
  • Each possible colour is represented by a (unique) bit pattern
  • The colour of each pixel is stored
  • The order of the bit patterns for the individual pixels indicates where the pixel will appear in the image
  • Metadata about the image will also be stored
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compare the similarities and differences between trojans, adware, spyware and viruses? How would you reduce the risks from these malwares?

A
  • these are all harmful malware that gives the hacker access to unauthorized data
  • Users sometimes choose to allow/install adware (this is not the case with the other types of malware
  • Spyware tracks what a user is doing - not adware
  • Adware does not do any harm to a computer system (unlike spyware, viruses and Trojans) though it can be irritating and be used to conceal spyware;
  • Viruses can replicate themselves / spread without the user being involved;
  • Trojans and viruses can be very destructive;
  • Spyware and adware work in the same way;

Reduce risk by:

  • Install anti-spyware/virus software and keep it updated regularly
  • only download things from trusted sources - research it
  • don’t use random external devices such as USBs
  • Don’t open attachments on emails from people you don’t know/trust;
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Does hexadecimal take up more space?

A
  • no as it will be converted to binary

- thus will take the same amount of space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a firewall provide network security?

A
  • monitors network traffic and prevents unauthorised access

- opens and closes ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain the difference between these two types of penetration testing

A

Black

  • external hacker so doesn’t know how the system works
  • finds loopholes and vulnerabilities
  • testing overall weakness in system

White

  • internal as insider and knowledge about the system
  • given a certain amount of access
  • testing certain and specific parts of the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe different categories of malware:

A
  • Trojan (horse); a program that misleads the user into thinking it is another piece of software which, when run, executes another program;
  • Spyware; a program that records data such as usernames and passwords on a host system and forwards the information to a third party;
  • Worm; code which will run autonomously and replicates itself on a host system
  • Ransomware; a program that encrypts user’s data to make it unreadable until they pay for the key;
  • Rootkit; malware that has managed to gain ‘root’ admin privileges; = changes permissions in OS
  • Adware; code embedded or attached to program files that will persistently show adverts (that attempt to generate revenue);
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a pixel?

A
  • single point in a graphical image
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is hexadecimal used?

A
  • hexadecimal is easier (for humans) to read (than binary); A. easier to
    understand
    • numbers are displayed in a more compact way (in hexadecimal than in
    binary);
    • it is quicker to type in (hexadecimal numbers than binary numbers);
    • it reduces the risk of typing errors (hexadecimal numbers than binary
    numbers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is analogue sound converted into digital sound?

A
  • a microphone/sound sensor picks up/detects the sound wave;
  • this wave is converted to an (electrical) analogue signal;
  • the amplitude/height of the wave is measured;
  • the sampling takes place at regular intervals;
  • these samples are stored as binary values;
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do we compress things?

A

To speed up file transfer;
• To use less storage (capacity);
• (It could) save money if you use less bandwidth;
• To use less memory;
• (It could) save money if you use less storage capacity;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does RLE work?

A

• the number of consecutive pixels/data points/characters of the same
- colour/value/character would need to be counted;
• (pairs of values would be stored), which would consist of a run length and the colour/value/character of the pixels/data points/text in the run
- add example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Find the errors:
“I would count the number of times each character appears in the string and create a frequency table sorted alphabetically. For example, the letter S has the highest frequency in Figure 2. Next I would take the two characters with the largest frequencies and combine them into a new node. The new node would be added to the end of the frequency table. The two characters with the lowest remaining frequencies are now combined into a new node and the process is repeated until all the characters have been added to nodes and the tree created.

A

• the characters with the highest frequencies should not be combined // the
characters with the lowest frequencies should be combined;
• the frequency table should not be sorted alphabetically // the frequency table
should be sorted in order of frequency;
• the letter S does not have the highest frequency in Figure 2 // E has the
highest frequency;
• the new node should not be added to the end of the frequency table // the new
node should be inserted in the correct place based on the combined
frequencies;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define cybersecurity:

A
  • (the processes/practices/technologies/methods designed to) protect
    networks/computers/programs/data;
    • from attack/damage/threats/unauthorised access;
17
Q

What is malware?

A
  • (Malware is a blanket/umbrella term for) computer software/program/code;
  • with malicious/hostile/intrusive intent;
18
Q

How can students exploit this:

  • weak and default passwords
  • misconfigured access rights
  • removable media
  • unpatched and/or outdated software
A

Weak and default passwords:
o students could use brute force methods to crack passwords
o weak admin passwords would allow students to gain admin level access
o default passwords allow students to gain access without any effort
o default passwords published online so everyone knows them.
• Misconfigured access rights:
o allows students to access areas they are not supposed to
o network admins might not know that secure areas had been breached as
no-one has ‘broken in’
o students could reconfigure network
o students could create new user accounts to give themselves admin access.
• Removable media:
o could contain malware that allows students to gain access to network
o could be used to steal data
o could be used to allow students to take control of certain network processes
(eg remote access systems).
• Unpatched and/or outdated software:
o could allow students to exploit known weakness/flaw
o known weaknesses/flaws are published online
o once in a student could install malware.

19
Q

How can networks in schools be protected?

A
  • Protect the school computers with a firewall/spam filters/anti-virus/anti-spyware software; and keep the software updated
  • Train staff/students not to click on links/download files/open attachments (in emails); from unknown senders/sources; and be cautious of emails that are personal or seem suspicious