DIT Flashcards

1
Q

what is an ad-hoc network?

A

a temporary network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is an example of an ad-hoc network?

A

a smart phone and a smart watch connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the problem with using an open network?

A

data is not encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

why do rural areas / countryside not have broadband but cities do?

A

too expensive for broadband companies to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does synchronization mean?

A

having the same data in 2 or more locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

list 2 features of cloud computing

A

online application software apps and online storage and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

state 2 impacts of modern technologies on infrastructure

A

buying hardware and regular back up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

state 1 impact of modern technologies for those working from home

A

can work around family

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

state 1 positive impact of modern technologies for working practices

A

can use collaboration tools like live online meetings and chat apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

state 1 negative impact of modern technologies for working practices

A

can waste time on chat apps and broadband could be poor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

state 2 collaboration tools

A

shared calendar, shared notice board and chat apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

state 2 ways to make an interface accessible for others

A

zoom in and out, audio, text to speech

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

state 2 reasons why people attack networks

A

fun, challenge and financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

state 6 examples of malware

A

virus, trojan, worm, rootlet, spyware and ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

state 4 examples of social engineering

A

phishing, pharming, blogging and shouldering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how does the ‘man in the middle’ attack work?

A

intercepting data packets that are sent between devices

17
Q

state 5 methods of device hardening

A

firewall, anti-virus, encryption, security patches and updates

18
Q

what is 2 factor authentication?

A

where you need to provide 2 pieces of evidence to log in to a network

19
Q

what does a firewall do?

A

stops unwanted data packets entering a network

20
Q

what is a drawback of a firewall?

A

it can reject authentic data packets

21
Q

what is the purpose of penetration testing?

A

to identify vulnerabilities within a network

22
Q

what does a black hat hacker do?

A

illegally hacks into networks

23
Q

what does a white hat hacker do?

A

is paid by the organization to try and hack into a network, to find vulnerabilities

24
Q

what does a grey hat hacker do?

A

illegally hacks into a network without the knowledge of the organization however they inform them and provide information about how they hacked in

25
Q

what are 2 internal threats?

A

accidentally losing data snd giving data away on purpose

26
Q

what are 4 impacts on the business of a data breach?

A

downtime, loss of data, loss of money and loss of reputation

27
Q

what does traditional computing involve?

A

using software on a device and saving the work on that device rather than online / on the cloud

28
Q

what does cloud computing involve?

A

saving work online and using online apps