Weekend Revision (Chapter 5 - Paper 1) Flashcards

1
Q

What is malware?

A

Software written to infect computers and commit crimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some examples of malware?

A

Trojans, Viruses, Worms, Ransomware, Spyware and adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is phishing?

A

Phishing is a form of social engineering where computer users are tricked into giving away personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What information do phishers aim to get?

A

Usernames, Passwords, credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do most people fall for phishing?

A

The perpetrators are usually disguised as a big legitimate company to gain your trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a brute force attack?

A

Trial and error method used via a computer program to decode encrypted data where the program guesses every possible passcode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a DoS Attack?

A

Denial of Service, flood a server with useless traffic, causing it to become overloaded and unavailable. Many DoS attacks exploit limitations in the TCP/IP stack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data interception?

A

Attackers use a technique known as network sniffing which is monitoring traffic on a network to pick out unencrypted passwords and configuration information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is data interception?

A

Attackers use a technique known as network sniffing which is monitoring traffic on a network to pick out unencrypted passwords and configuration information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are SQL injections?

A

Code injection technique used to attack data-driven applications. SQL injection makes use of vulnerabilities in poorly coded database applications. Code can be entered into text boxes and is then executed by the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the effects of malware?

A

Deleting corrupting and encrypting files, slowing down or causing systems to crash, reducing internet connection speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can system vunerabilities be caused by people being careless?

A
Not installing system updates
Not keeping anti-malware up to date
Not locking doors or computer rooms
Sharing passwords
Not encrypting data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you prevent against a Brute force attack?

A

Network lockout policy - accounts lock out after a certain number of failed login attempts.
Progressive delays
Staff training around effective passwords with symbols and unique characters,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you prevent against a Brute force attack?

A

Network lockout policy - accounts lock out after a certain number of failed login attempts.
Progressive delays
Staff training around effective passwords with symbols and unique characters,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you prevent against a DoS attack?

A

Strong firewall
Packet filters
Web server configuration
Auditing, logging and monitoring systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to prevent data interception?

A

Encryption

Virtual networks

17
Q

What are some common prevention methods?

A
Penetration testing
Anti malware
Firewall
User Access Levels
Passwords
Encryption
Physical Security
18
Q

What is the application software?

A

Managed by OS, user interacts with the system via the user interface which is provided by the OS

19
Q

What do utility programs provide?

A

Extra functionality to the OS.

20
Q

What does file management do?

A

Allows you to name files, set things in folders, user access levels.

21
Q

What do device drivers do?

A

Allow 3rd party hardware to communicate with operating system.

22
Q

What are the key features of a GUI?

A
Windows, icons , menus, pointers
Visual
Interactive
Intuitive
Optimised for mouse and touch gesture input.
23
Q

What is CLI?

A

Text based and less resource intensive than GUI’s, input more commands than GUI’s and it is highly efficient.

24
Q

What is a menu user interface?

A

Successive menus are presented to the user
single options chosen at each stage
often with buttons on a keypad

25
Q

What is multitasking?

A

When you have one or more programs open and running at the same time.

26
Q

How does multitasking work?

A

Processor allocates a small amount of time to each process and cycles between them.
As it happens quickly, it appears as if multiple programs are executing simultaneously

27
Q

What do defragmentation utilities do?

A

Reorganise files on a hard disk, putting fragments of files and free space back together,