Computer Management Flashcards
What are some common errors made by people (5)
Giving sensitive information to the wrong people
Writing down your passwords
Using the same password for all your accounts
Choosing an insecure password
Clicking on links in emails without first verifying them
What does GIGO stand for
Garbage In, Garbage Out
What does GIGO mean
If you put in incorrect information then you can expect the program to give you incorrect results
What are the 3 most common reasons for data loss on a storage device
Mechanical damage of hard drive
Power Failures
Spilling coffee, and other water damages
What are the 8 threats to a network
Virus
Worm
Trojan
Rootkit
Spoofing
Phishing
Pharming
Malware
What is a virus
A malicious software that is loaded onto a user’s computer without their knowledge and replicates itself and performs malicious actions
What is a worm
A type of malware that spreads copies of itself from one computer to another
What is a trojan
A type of malware that is disguised as useful software
What is a rootkit
Malware that is designed to infect a computer and allow an attacker to install a set of tools that grant him remote access to the computer. Hidden within the operating system and is designed to hide from anti-malware applications
What is Spoofing
When the attacker disguises an email to pretend that the email is sent from a known, trusted source.
What is Phishing
Try to obtain sensitive information by sending emails to users that look like official emails
What is Pharming
Pharming attacks create official-looking websites that request sensitive information.
Involves malicious code being installed which misdirects users to a fraudulent website
What is Malware
Malicious software designed to disrupt, damage or gain unauthorised access to a computer system
What are the 3 types of backups
Full backup
Differential backup
Incremental backup
What is a full backup
When a copy of every single file and folder in the system is made
What is a differential backup
Starts with a full backup and after that it copes those files that have been changed since the full backup took place
What is an incremental backup
Also starts with a full backup, after that a copy of the files that have changed since the last backup is made. Whether its a full or incremental.
What are the 3 backup locations
Local Backup
Offsite backup
Online / Cloud backup
What does UPS stand for and what is it
An uninterruptible power source
A device that allows a computer to continue running for a short time when power is lost due to a power failure
What is a firewall
Hardware, software or a combination of both that monitors income and outgoing traffic on a network
What is an anti-virus
System software designed to prevent, detect and remove malware infections on computing devices
What are 4 tasks that antivirus programs can perform
Scan specific files for malware or known malicious patterns
Allow you to schedule scans to automatically run for you
Allow you to initiate a scan of a particular file or your entire computer
Remove any malicious code it detects