errors threats and security Flashcards

1
Q

what is GIGO?

A

it stands for “garbage in, Garbage out” and means that if invalid data is entered the resulting output will also be invalid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

describe a rounding error.

A

when numbers are rounded accuracy is lost on the decimal places after which the rounding took place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

describe a truncating error.

A

Truncating a real number to an integer loses all decimal values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

describe a fixed number of bits error.

A

the number of bits available determines the highest and lowerts numbers that can be contained. If a number is outside of that range it cannot e stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

describe overflow error

A

calculations that result in answers that exceed the maximum value for a data type will still be performed but the answer will be incorrect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how is data sent

A

in packages from one point to another either using cabled or wireless transmission data doesnt reach its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what happens if the data does not reach the destination intact.

A

there is a high possibility of data corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how do you check for succesful data transmission

A

atmospheric conditions: if cable heats up too much it could lead to damage to the cable and make it unable to carry data. moisture could also damage a cable
Distance limits:
Cables can only carry signals over a limited distance after which attenuation occurs and the signal doesn’t reach its destination
interference-causing devices:
interference can be cause by seemingly harmless things like motors and fluorescent lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are programming errors

A

errors caused by programmers and these are referred to as “bugs”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are solutions for errors?

A

verification and

Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is data verification

A

a systematic process for evaluating performance and compliance of a set of data when compared to a set of standards to ascertain its completeness, correctness and consistency using the methods and criteria defined in the project documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is validation ?

A

data validation is the extensive number of checks applied to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how does data validation work?

A

when writing programs a programmer must include validation code using simple conditions and exception handlers to reject incorrect data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the step for data validation ?

A

Presence:the data must exist
Range: the data has a lower and upper bound.
Uniqueness: No duplicates exist for the data
Length :the data must be of a specified length
type:
the data must be of an appropriate type
Format: the data requires an entry in a specific format
Logical : the data is consistent with the scenario
Check digit: a digit with the data must be a certain value
Check sum :verifies the integrity of a file or data transfer
Data Transmission between nodes during network communication: ensures accurate data transmission between nodes during network communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the techniques for input ?

A
keyboard input 
barcode scanner 
QR codes GUI components 
RFID(radio frequency identification 
biometric input 
optical character Recognition(OCR)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

describe key input.

A

least favourable. Many validation issues are prevalent. inputs using this method should be limited to text that doesn’t need to be validated the more input the more difficult it is to validate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

describe barcode Scanner.

A

Data can be encoded in a bar code and read by a scanning device the barcode needs to be interpreted as meaningful data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

describe a QR code

A

it is a two-dimensional version version of the one-dimensional barcode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what does QR stand for?

A

Quick Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what advantages do QR codes have over barcodes

A

QR codes can be scanned like taking a photo on a smart device
QR codes can be pointers to barcordes in a database like barcodes but can also point URLs and navigate to sites or documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what can GUI do ?

A

GUI offers components where the user can select options using menus, drop-down boxes , radio buttons and/or check boxes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

how does RFID work

A

it makes use of radio signals to transfer data from a tag attached to an object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

how do tags work if they are needed over large distances

A

the use an embedded power source and emit radio waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what are RFID tags used for

A

vehicles and other industrial items
warehouse products
Livestock and pets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

define a biometric input device

A

it is a security identification authentification device which uses automated methods of verifying or recognising the identity of a person based on a physiological of behvaioural charactersitic.including fingerprints, facial images iris and voice recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

explain OCR

A

Optical Chracter REcognition is the mechanical or electronic conversion of images of typed, handwritten or printed text into machine-encoded text .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what is OCR commonly used for

A

the digitising of printed texts so that they can be eletronically edited sreach stored more compactly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what are the types of database management system integrity

A
accuracy 
correctness 
currency 
completeness 
relevance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what is accuracy

A

the degree to which the stored value measures against the true value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what is correctness

A

data is correct if it conforms to an approved or conventional standard or agreeing with fact, logic , or known truth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what is currency

A

data is current if it is up- to-date or not oudated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what is completeness

A

data is complete if all required data is known.while some fields can be left out other are essential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what is relevance

A

data is relevant to a a situation or problem scenario and can contribute to providing meaningful informatinon about the situation/ problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

why is SQL so easy to use maliciously?

A

SQl is a very helpful query tool and can be used with malicious intent to gain access to confidential data and even corrupt or destroy entire tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

where do hardware failures cause the most problems globally?

A

in storage and power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

what happens during a power failure

A

power failure is not the cause of damage it’s the state of components at the time that causes probelms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

what damage can occur during power failure?

A

data damage can occur

after the power comes on a surge can occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

how are surges prevented?

A

a surge is usually stopped by an electrical circuit breakker outside of the computer surge protectors or hardware safety measures inside of modern Power Supply Units (PSU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

what is malware

A

malware is when an unauthorised source gains access to your software

40
Q

explain phishing and spoofing

A

phishing is usually a convincing email that is sent to a user requiesting the user to click on a link that will take the user to a fake or spoofed website which wil request the user to enther their banking or credt card details giving the crimicnals access to their online bankn accounts

41
Q

what is website spoofing

A

the act of creating a website with the intention of misleading readers that the wevsite has been created by a diffirent person or organisation

42
Q

what phishing commonly used for

A

identity theft

43
Q

how does a virus work

A

it attaches itself to a program or file that is then spread from one computer to another leaving a copy of itself as it travels

44
Q

what is a trojan horse

A

a seemingly harmless program that when activated causes harm to a computer system and design to be valid and useful software but will do damage once inistalled and run on a computer

45
Q

what is spyware

A

it software that “spies” on a computer and can capture information like web browsing habits e-mail messages usernames and password and credit card information if left uchecked it can transmit data to antoher person’s computer over the internet it can be installed when opening an e-mail attachment

46
Q

what is pharming

A

it is an attack intended to redirect a website’s traffic to another site and is conducted by changing the host’s file on a victim’s computer or by expolitation of a vulnerability in DNS server software

47
Q

what does ransomware do

A

prevents or limits the user from accessing their computer system until they have paid ransom through an online payment system

48
Q

what does a denial of service attack do

A

attempts to make a server or netowrk resource unavailable to its users and visitors

49
Q

how does a denial of service attack work

A

it uses one computer and one Internet connection to send massive requests to a server at a time interrupting or suspending a host service connected to the Internet temporarily or indefinitely

50
Q

what happens if a host server suffers a DOS attack

A

all the websites hosted on this server will be inaccessible

51
Q

what is a DDoS attack

A

a Distributed Denial of Service attack and it uses more than one computer distributed worldwide to put a heaby burden on a service

52
Q

what is the difference between Dos and DDos

A

the attackers use only on computer and one Internet connection when launching Dos while attackers use a widely distrbuted network of computer and many Internet connections in a DDoS attack

53
Q

what are Open Ports

A

all communication that happends over the internet is exchange via ports every IP address can have up to 65,535 ports inluding TCP and UDP services that connect to the internet use specific ports to recieve informatnion and these ports need to be open in order to functino

54
Q

what is a botnet

A

several internet computers that have been set up to forward transmssions to other computers on the Internet without the knowledge of their owners

55
Q

what are WIFI vulnerabilities

A

open networks don’t use encryption and therefore make all data traffic visible to a malicious actor who wants to see any online communication of the people physcally nearby unless the app or site being used enforces encryption

56
Q

what is a data leak

A

it involves the unauthorised or unintentional transfer of sensitive informatnion from a mobile device to an Internet service

57
Q

what is RAID

A

Redundant Array of Inexpensive Disks uses two or more hard disks so that if one hard drive fails the other hard drives on the server will contain a copy of the data providing reliable hard drive storage It protection against hard drive failure

58
Q

explan Raid level 1

A

it uses mirroring in which all data is stored on two hard disks simultaneously but data is only accessed from one main hard disk with the second kept as a backup

59
Q

what is RAID level 5

A

it uses disk striping with parity which requires a minimum of three hard disks data is written in “stripes” across the three hard drives with no one disk having the same data

60
Q

what is the parity

A

it is usually an extra bute added to every 8 bytes of data for error correction

61
Q

what does parity do

A

ig one disk fails the parity data is used to reconstruct the disk that failed

62
Q

what is backup

A

a copy of the data placed into a secure space int the cloud or external hard drive

63
Q

what what is it called when data is coped each time a backup is run

A

full backup

64
Q

what is a differential backup

A

it creates an initial full back up and threreafter only backs up the new or chnged files reducing the size of subsequent backups by doing a comparison of the original files and the last full backup

65
Q

what are the advantages of onsite backup

A

quick Access to Data
low cost
easy to install

66
Q

what are the disadvantages of onsite backup

A

security

and damage

67
Q

what are the advantages of remote backup?

A

multiple Copies of data
security
capacity

68
Q

what are the disadvantages of remote backup

A

cost

speed depends on internet connectivity

69
Q

what is UPS or Uninterruptible power supply

A

privdes emergency power to electrical equipment when normal power source fails

70
Q

what does UPS provide

A

immediate protection against power failures, data loss, hardware damage and failure to shtu down properly

71
Q

what is redundant power supplies

A

single pieve of computer equipment that operates using 2 or more physical power supplies

72
Q

what are the advantages of biometrics over passwords

A

uses unigue data
convenient to use
supports multifactor authentication

73
Q

what does authentication does

A

porcess of validatings usernames+passwords submitted

74
Q

what does user-level security do

A

protects shared network resources by using security provider to authenticate requests to access resources

75
Q

what does a domain controller d

A

grants access after verifying username and password

76
Q

what is share-level security

A

it protects shared network resources with individually assigned passwords.

77
Q

what does active directory users and computer mean

A

manage users groups and computers

78
Q

what is encryption

A

process that uses algotithm to transform data stored in database to cipher text to be incomprehensible until decrypted

79
Q

what is asymmetrical encryption

A

public and privaet key encryption two non-indetical crytographic key that encrypt and decrypt message

80
Q

what is a public key

A

available to everyone and

81
Q

what is private key

A

confindential to respective owner

82
Q

what does encryption achieve

A

confidentiality and creates digital signature

83
Q

what is symmetrical encryption

A

both keys are the same

84
Q

what is a digital signature

A

when you click “sign “ in email application or select file to be signed

85
Q

what is key length

A

number of bits in key

86
Q

what is brute force attack

A

to guess key speed of device running through combinations increase because length of key must increase

87
Q

what is temporal key integrity protocal (TKIP)

A

encryption protocol fo wireless LANs each data packet is encrypted using 48-bit serial number incremetned for each instead of using 1 pre-shared key for all packets

88
Q

what is a firewall

A

set of related hardware and software protects resources of private network from users on other networks works with router program to examine network packets to forward to destination and works with proxy server to make network requests on behalf of workstation users

89
Q

what is port filtering

A

firewall monitors pots of network protocol packets that pass through firewall blocks packets heading to certain prt/packets based on certain content prevent users from using ports that provide holes for hacker to get inside network

90
Q

what are Audit trails

A

show who accessed computer what operations performed maintain security a recover lost ransactions

91
Q

what does anti-malware do

A

focuses on newer malware and upgrades rules quickly to provide protection when using internet

92
Q

what is anti virus

A

prevents,detects and remoes malware infections in computers server or networks

93
Q

what is a virus signature

A

fingerprint of virus ser of unique data/bits of code that detects quarantines and removes virus

94
Q

what is anti-spam

A

program that detects and blocks unwated email from getting into user’s inbox

95
Q

what is spam

A

irrelevant message sent over internet to many users for advertising phishing or spreading malware

96
Q

what does outdated hardware do to your device

A

compromises system security

97
Q

why is important to upgrade software

A

more cst and time effective to upgrade software