Computer Management -Module 1.3 Flashcards

1
Q

What is malware?

A

Malicious software specifically designed to install itself without the users knowledge to affect/harm the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

5 Threats/ Types of Malware

A
Virus
Computer worm
Spyware
Trojan
Root kit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or false?

A virus needs human action to trigger its negative playload.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or false?

A computer worm needs human action to travel over the computer network.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a rootkit?

A

A collection of programs designed to infiltrate a computer no gain the highest level of privileges to take control of the infected computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define a kit.

A

A collection of programs that can be downloaded from the Internet and adapted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name five human issues when speaking about threats to a computer.

A

Accidentally deleting files or reformatting a disk
Not ensuring regular backups are made
Entering incorrect data into a program
Losing or misplacing portable storage devices
Allowing unauthorized users to get access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name two types of Social Engineering

A

Phishing

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is phishing?

A

Fishing for information by fooling a user into giving out confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name three types of hardware issues.

A

Hardware failure
Hardware theft
Power problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Power problems can be a result of?

A

Data in RAM not saved into storage in a power failure
Data corrupted when written back into storage
Damage caused to the hardware (due to power outages)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does GIGO stand for?

A

Garbage In, Garbage Out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When backing up, dedicated programs have options of?

A

Scheduling when to backup the files
Choosing to do full back up of all files or just those that have been changed since the last backup
Compressing the files to save space on the backup media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advantages of online backup services

A

(Limited) free storage space
Synchronizing data files across all your devices to make sure you always have the latest dat files
Sharing files with other users
Being able to access your files wherever you have Internet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give 5 tips when backing up your data

A

Programs can be reinstalled, only back up data
Automate/schedule backup software so that you don’t forget
Archive large files you seldom use
Backup your files to no external device such as a portable hard drive
Do not have multiple files of the same things on your computer (housekeeping)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical measures to restrict access to data

A

Physical security by controlling access to a building
Biometric security measures (fingerprint scanners)
Placing computers with confidential information in a lockable room/cabinet

17
Q

5 Categories of threats to data

A
Unauthorized access to data
Malware threats
Human issues
Natural disasters
Hardware and software issues
18
Q

Basic software measures

A

Set strong passwords, change them regularly, don’t reuse the same password
Permission can be given to certain users but they cannot edit the data

19
Q

What is encryption?

A

Scrambling text or data into a new format using a specified set of rules

20
Q

2 Advantag s of using anti-malware products

A

Generally cheaper than separate utilities

Protection is much easier, won’t interfere with other security programs

21
Q

3 Ways to reduce malware threats

A

Use of anti-malware products
Keeping software up to date
Firewalls

22
Q

Name 3 common sense precautions when reducing the human risk factor

A

Automate process by scheduling backups and updates
Set strong passwords
Keep your anti-malware and operating system updated

23
Q

5 Precautions to take when you are online

A

Be aware of potential dangers and threats
Don’t give out any personal information, unless you are sure it is legitimate
Be careful when clicking on links
Only use secure sites
Don’t respond to phishing emails

24
Q

4 Ways in avoiding the Social Engineering tricks

A

Avoid contact from uninvited sources
Guard your personal information
Pay attention to the URL of the website
Nothing is usually free

25
Q

What does UPS stand for?

A

Uninterruptible Power Supply

26
Q

What does RAID stand for?

A

Redundant Array of Inexpensive/Independent Disks

27
Q

What is a UPS?

A

A device that puts a battery and a management system between a computer and the mains power supply to ensure that if there is a power outage it gives the computer a bit of power to shut down properly

28
Q

What does RAID do?

A

Allows the computer to trade an array of disks as one to increase protection

29
Q

Name one main characteristic of a computer

A

Accuracy

30
Q

How can we ensure our software works? Name 3 ways

A

Producing the correct output
Reducing the GIGO effect
Ensuring our program can act to any situation without crashing

31
Q

Computers can never really check for correctness. How can we ensure the accuracy of data?

A

Do everything we can to ensure data validity
Getting the computer to obtain input directly from the input rather than a human
Send users copies of data to ensure it is correct
Comparing the original source with captured data

32
Q

What is data validation?

A

Any technique that can reduce the number of errors that can be made during the input of data

33
Q

Methods and techniques used in data validation

A
Minimizing user input 
Format checks
Data type checks
Range checks
Presence check