1.4.1 Threats To computer Systerm and Network Flashcards

1
Q

Describe what Virus and what how does it spread? ( 2 marker )

A

(1 mark) Virus is a virus is a type of malware that spreads by attaching itself to other programs. (1 mark) Virus needs human interaction to spread ( ex files, email )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe what a worm is and why it doesn’t need a human interaction to hack ( 2 marker )

A

(1 mark ) Worms can spread from device to device. Unlike a virus, they don’t need to attach themselves to other programs. ( 1 mark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a malware (1 mark )

A

(1 mark) Malware programs that try to do something unwanted to your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does BFA stands for and Describe what BFA is (2 marker)

A

(1 mark) Brute force attack . Brute force attack is basic attack where you essentially try to crack a password by trying
every combination of letters and symbols (1 mark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SQL (1 mark)

A

(Structured query language) - allow database develops interrogate the data held in database (1mark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SQL injection

A

A injection is a web security vulnerability that allows the attacker to interface.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name 3 factors that can affect the performing levels ( 3 marker )

A
  • Interface(1 mark)
  • Bandwidth(1 mark)
  • type of distance(1 mark)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name a advantage and disadvantage of wireless connection (2 mark)

A

(1 mark) adv// Portable (1) dis//less secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is firewall? (1 mark)

A

Firewalls are used to check data packets as they are sent to or received(1 mark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the term Phishing mean?
(1 marker)

A

Trying to trick someone into giving out information over email is called ‘phishing’(1 mark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is data interception and how does it happen? (2 marker)

A

(1mark) Where data is intercepted during transmission.(1mark) This is done using software called a packet sniffer, which examines data packets as they are sent around a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is wireless more insecure?(1marker)

A

allows anyone to join without a password. (1mark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is not using common words and short password not a good idea? (1 marker)

A

Can be hacked/cracked easily by using BRT or Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is dictionary attack?(1 marker)

A

A dictionary attack behaves in the same way but uses a list of words instead.(1mark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly