Section 4 Flashcards

(41 cards)

1
Q

What is malware?

A

Software designed to harm or exploit a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus?

A

Malware that attaches to programs/files and spreads when shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a worm?

A

Standalone malware that self-replicates across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Trojan?

A

Malware disguised as legitimate software to trick users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is a new reputable CD/DVD unlikely to contain a virus?

A

It is read-only and produced securely so cannot be altered after manufacture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is social engineering?

A

Tricking people into revealing confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is phishing?

A

Fraudulent emails/websites used to steal personal or login details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give one sign of a phishing email

A

Spelling mistakes or generic greeting (not personalised).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to protect against phishing?

A

Do not click suspicious links and verify sender authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is blagging?

A

Tricking someone into giving confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is brute force attack?

A

Trying many password combinations until correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a DoS attack?

A

Flooding a network/server to make it unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is shoulder surfing?

A

Watching someone enter passwords or PINs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a man-in-the-middle attack?

A

Intercepting and possibly altering communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is SQL injection?

A

Inserting malicious code into database queries to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to prevent SQL injection?

A

Input validation and restricting database permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is penetration testing?

A

Testing a system to find security weaknesses.

18
Q

What does antivirus software do?

19
Q

Why must antivirus be updated?

A

New viruses are constantly created.

20
Q

What is a firewall?

A

System that monitors and blocks unauthorised network traffic.

21
Q

How does a firewall protect?

A

Filters traffic based on rules (IP

22
Q

What makes a strong password?

23
Q

Why use account lockouts?

A

Prevents repeated password attempts (brute force).

24
Q

What are access levels?

A

Permissions controlling what users can view/edit.

25
What is encryption?
Converting data into unreadable form without a key.
26
Why use HTTPS?
Encrypts data sent over the internet.
27
Give one physical security measure
CCTV or locked doors.
28
Why lock/log off computers?
Prevents unauthorised access.
29
What is human error in security?
Mistakes by users that cause breaches.
30
What is buffering?
Temporary storage to handle speed differences between devices.
31
What is file fragmentation?
Files split into parts across disk
32
What does defragmentation do?
Reorganises files to improve access speed.
33
Why not defragment SSDs?
No benefit and may reduce lifespan.
34
What is file compression?
Reducing file size for storage/transmission.
35
Difference between lossy and lossless compression?
Lossy loses some data; lossless preserves all data.
36
What does an operating system provide?
- User Interface - Memory Management - Peripheral Management - User Management - File Management
37
What is a user interface?
- Way we interact with computer hardware - GUI: Graphical User Interface (WIMP) - CLI: Text prompt and command, Command Line Interface
38
What is memory management?
- Switching rapidly between several tasks (multi-tasking) - Allocates adequate blocks of free space in main memory for programs and frees up space for reuse when finished
39
What is peripheral management?
- Computer hardware components not part of CPU - Manage these devices - Controls sending over data
40
What is user management?
- Enables network administrator to allocate accounts and set different access rights - Identify users on network, manually log out users and see how long each user is logged in
41
What is file management?
- Enables user to create, name, save, modify, copy, delete and move files - Keep track of locations of files and free space - Maintain access rights to files