AQA A-Level Computing 6.4 Internet Security Flashcards

1
Q

Virus

A

A small program attatched to another program or data file. It replicates itself by attaching itself to other programs. It usually attacks the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spam

A

Unsolicited junk e-mails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Worm

A

A small program that exploits a network security weakness (security hole) to replicate itself through computer networks. It may attack computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Remote login

A

When someone connects to a computer via the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trojan

A

A program that hides in or masquerades as desirable software, such as a utility or a game, but attacks the computers it infects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

When someone tries to get you to give them your personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pharming

A

When a phisher changes DNS server information so that customers are directed to another site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

Using an algorithm and a key to convert message data into a form that is not understandable without the key to decrypt the text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Plain text

A

Message data before it is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cipher text

A

message data after it has been encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decryption

A

Using an algorithm and a key to convert encypted message data into its plain text equivalent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptography

A

The science of designing cipher systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptanalysis

A

Trying to find the plain text from the cipher text without the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Break the code

A

Find the plain text from the cipher text by guessing or deducing the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly