Computer Management Flashcards

1
Q

What are some common errors made by people (5)

A

Giving sensitive information to the wrong people
Writing down your passwords
Using the same password for all your accounts
Choosing an insecure password
Clicking on links in emails without first verifying them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does GIGO stand for

A

Garbage In, Garbage Out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does GIGO mean

A

If you put in incorrect information then you can expect the program to give you incorrect results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 most common reasons for data loss on a storage device

A

Mechanical damage of hard drive
Power Failures
Spilling coffee, and other water damages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 8 threats to a network

A

Virus
Worm
Trojan
Rootkit
Spoofing
Phishing
Pharming
Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a virus

A

A malicious software that is loaded onto a user’s computer without their knowledge and replicates itself and performs malicious actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a worm

A

A type of malware that spreads copies of itself from one computer to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a trojan

A

A type of malware that is disguised as useful software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a rootkit

A

Malware that is designed to infect a computer and allow an attacker to install a set of tools that grant him remote access to the computer. Hidden within the operating system and is designed to hide from anti-malware applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Spoofing

A

When the attacker disguises an email to pretend that the email is sent from a known, trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Phishing

A

Try to obtain sensitive information by sending emails to users that look like official emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Pharming

A

Pharming attacks create official-looking websites that request sensitive information.
Involves malicious code being installed which misdirects users to a fraudulent website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Malware

A

Malicious software designed to disrupt, damage or gain unauthorised access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 3 types of backups

A

Full backup
Differential backup
Incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a full backup

A

When a copy of every single file and folder in the system is made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a differential backup

A

Starts with a full backup and after that it copes those files that have been changed since the full backup took place

17
Q

What is an incremental backup

A

Also starts with a full backup, after that a copy of the files that have changed since the last backup is made. Whether its a full or incremental.

18
Q

What are the 3 backup locations

A

Local Backup
Offsite backup
Online / Cloud backup

19
Q

What does UPS stand for and what is it

A

An uninterruptible power source
A device that allows a computer to continue running for a short time when power is lost due to a power failure

20
Q

What is a firewall

A

Hardware, software or a combination of both that monitors income and outgoing traffic on a network

21
Q

What is an anti-virus

A

System software designed to prevent, detect and remove malware infections on computing devices

22
Q

What are 4 tasks that antivirus programs can perform

A

Scan specific files for malware or known malicious patterns
Allow you to schedule scans to automatically run for you
Allow you to initiate a scan of a particular file or your entire computer
Remove any malicious code it detects