comp 1.5: what are the 3 types of system software
utility/application software, device drivers, operating software
comp 1.5: what does the operating system do
a piece of software that controls system hardware, it has mangers for each piece of hardware
comp 1.5: name all of the managers used by the operating system
memory manager, user manager, process manager, file manager
comp 1.5: what is a CLI
it is a command line interface
comp 1.5: what is a GUI
it is a graphical user interface
comp 1.5 what is a WIMP
stands for Windows Icons menus and pointers, it is a system of software features designed to simplify system operation for the user
comp 1.5: name 4 types of utility software
defragmentation, encryption, compression, backup
comp 1.5: what is a single user OS
it is an operating system interned to only have a single user at a time, although more than one user can use the OS at different times, the user manager keeps track of this
comp 1.4: what is social engineering
someone being influenced into giving away info that could grant access to accounts
comp 1.4: what is an insider attack
it is an attack by someone on the inside where the give away vunerable info
comp 1.4: what is an active attack
using a technical method, such as malware or other to compromise a networks security
comp 1.4: what is a passive attack
this is an attack where attackers eavesdrop by ‘sniffing’ data packets
comp 1.4: what is a penetration test
this is where an organization performs a controlled attack on itself to identify its weak spots, this can be performed by ‘ethical hackers’
comp 1.4: name all of the types (7) of malware
comp 1.4: what are firewalls and what do they do
they are either hardware or software that ‘sits’ between the user and the internet that filter packets
comp 1.4: what are the 4 types of active attacks
comp 1.4: what methods do firewalls use to filter packets
comp: what is a protocol
a set of rules for transferring data
comp 1.4 what are the 4 methods of data interception
comp 1.4: what are botnets
they are many machines infected with malware that can be used for DDoS attacks
comp 1.3: what is a switch in networks
it is a device that connects serval devices to make a wired network
comp 1.3: what is a network layer
they break up the sending of packets into different components, each component handles a different part of the communication(TCP/IP model)
comp 1.3: what is a NIC
a network interface controller is a device that provides connection between a device and the network
comp 1.3: what is a router
this is a piece of hardware that connects networks together