ding dong iiits 3 systems software and security Flashcards

1
Q

what is a virus

A

a form of malware that inserts itself into normal programs so when the host program is executed, the virus is too

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is a worm

A

a form of malware that spreads autonomously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a trojan

A

malware installed on a computer disguised as desirable software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is spyware

A

malware that collects data about activities on the computer, then sends it back to the attack investigator e.g. recording passwords entered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is adware

A

malware that automatically renders unwanted adverts to generate revenue e.g. unclosable pop ups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is phishing

A

obtaining sensitive info by disguising the message and/or link as a trustworthy source
can contain malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is social engineering

A

a form of attack that exploits the fact that often the weak points in systems by manipulating them to get info or access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a brute force attack

A

when al possible combinations are systematically tried with the hope of eventually getting it right

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a denial of service attack

A

when a network resource becomes deliberately overloaded with unnecessary requests, preventing it from responding normally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is an SQL injection

A

when an SQL command is entered as a user input on a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is encryption

A

the process of encoding data and making it secret so that only the authorised viewers can decrypt and read the data and third parties cannot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

network policies

A

acceptable use
disaster recovery - rules for when something goes wrong
backup policy
failover - if a piece of key hardware - e.g. server - sotps working a secondary back up device will take over the functionality to prevent network downtime
archiving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly