Extra Flashcards

1
Q

Why was Unicode created?

A

To be able to represent additional/more languages and symbols not available in the ASCII character set. To represent characters from other character sets and ones that are not English.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is data read from optical disks?

A

Disk rotates at high speeds and the laser head moves across the radius of the disk and the laser shines onto the disk. Tiny indentations/pits/bumps reflect light differently to lands/flats. Different colour of dye reflects or blocks laser light. Reflected light is interpreted into 1s and 0 representing data stored on disk. Data is stored on a signal spiral track rather than concentric tracks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why would a company not want to make their source code of the software available?

A

So third parties cannot insert/modify code and pass it off as original as it affects profitability. Algorithms cannot be copyrighted and therefore need to be protected to preserve commercial advantages. Hacking/cyber security as hackers could identify vulnerabilities in the source code and use them to create targeted attacks. Copyright of code-they may not want others to have access to what they have developed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some advantages of star topology compared to bus?

A

Less likely to experience transmission errors/data traffic problems(contention issues). Faster transmission data. Fewer/no collisions if a switch is used rather than a hub. Also better security potentially as data is not broadcasted to all machines if a switch is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some negatives of star topology as oppose to bus?

A

It is harder to install and requires more cable. It is more expensive to install as more cable and hardware is needed. Switch/hub/central device may fail breaking the entire network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the positives of a network?

A

Sharing of resources such as printers and storage space. Managed/central backing up of data. Central installation and management of software by network admin. Monitoring of users and network activity centrally by network admin. Hot Desking/users can log onto any machine. Ability to use communication tools between computers and centrally managed access rights. Rapid data sharing and it allows decentralised/home working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the negatives of networks?

A

Spreading of malware and cost of infrastructure. Cost of network admin required to run network and dependency on network hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do firewalls increase the security of a network?

A

It monitore network traffic and makes sure only the authorised traffic is allowed. It also opens and closes porte as necessary. Prevents unauthorised access into the network by checking IP/MAC address and the packed content. Prevents unauthorised transmissions from inside the network to external locations (insider attack?).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can passwords authorise a user?

A

A set of characters that is known by the person who is being authenticated. A set of characters is entered and compared against a database/recorded version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can biometric measures authenticate?

A

Measures such as fingerprint, facial, iris or voice print that use the users physical features to prove who they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Email conformation authentication?

A

Sends an email which requires a valid email adress and for the recipient to respond to prove the email and hence the user is valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What other measures of authentication are there?

A

Two factor authentication, security questions and authenticator apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Does hex use more space?

A

The number will still be represented using binary in the computers memory so it will take up the same amount of memory space.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two advantages of using unicode in comparison to ASCII?

A

Can represent a wider range of characters and characters from a wider range of languages. Can represent characters used in scientific/mathematical specialist documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many bits is ACII?

A

7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why do most desktop computers have a magnetic hard disk drive and a solid state drive instead of just solid state?

A

Using just solid state would cost much more and you can get higher storage capacity by including magnetic hard disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Magnetic.

A

Whole sector/block is read in one go by the read/write head/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a reason for a school to allow teachers to access the school network from their home?

A

Teachers can access resources on the school network to allow them to plan lessons at home, teachers can teach lessons from home if they are not able to get into work if they have travel difficulties. Teachers can also access electronic copies of students work so they do not have to carry marking home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a reason for a school to not allow access to the school network from home for teachers?

A

Data protection issues for example if the school may not want potentially sensitive student information to be accessed outside of school. To help teachers have a work-life balance. Increased security risks as teachers may not have fully protected computers and if they dont have an antivirus then it could cause issues for the school network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What can networks do?

A

Increase available storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Difference between PAN and lan.

A

you have to cover both to actually state a difference. For example PANs are centred round one person whereas LANs cover a limited geographical area/ larger area. Or one person v more than one usually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is used to make a payment securely when purchasing goods from a website?

A

HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

In Von neuman what stores the things in the main memory?

A

Bit patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is blagging?

A

This is where a victim is tricked/persuaded by a fraudster to give their details or payment information for a false reason/purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is phising?

A

Where a victim receives and responds to a communication that appears to be from a valid or known source but is in fact fraudulent and allows the fraudster to capture private information before the victim realises.

26
Q

What can shouldering be used to d ?

A

Gain access to a system.

27
Q

Why must sound be converted to digital?

A

Computer systems use binary whereas sound is analogue/continuous and computers use digital data/discrete values.

28
Q

Are binary and assembly both low level?

A

Yes.

29
Q

Why would a developer who is good at low and highj use high level langauges when writing programs?

A

High level languages have built in functions and libraries and also have more support/help. High level languages have structures such as selection and iteration. They are also more portable and less machine dependant. Usually requires fewer lines of code to be written and is quicker to develop usually. It is easier to find mistakes and easier to understand and maintain. Easier to structure.

30
Q

State two reasons why a game café should use biometric authentication as oppose to password authentication.

A

Staff could forget their password but staff cant forget biometric measure. Shouldering risk when staff entering password but no risk of shouldering when using biometric data so lower risk of hacking.

31
Q

Why would it not be appropriate for the café to use MAC address filtering on their wireless network.

A

Network is made available to the members of the public so wont know the MAC addresses for most of the devices connecting to the network.

32
Q

What are the reasons for growth of cloud storage?

A

Higher bandwidth mobile networks like 4g and there is an increased availability of mobile devices. Reduction in cost of large capacity storage devices and improvements in network security so people have a higher trust in cloud storage. Improvements in web browser software and increased availability of super computers for cloud processing. Companies have managed to develop business models based on cloud computing that allow them to make a profit.

33
Q

What are the advantages of cloud storage?

A

Enables the user to access their data from more places/devices and enables the user to more easily share data with others as you can make parts of your cloud storage publicly available. Increases amount of storage available and reduced cost of computing devices for users as no need for as much built in-secondary storage.

34
Q

What are the disadvantages of cloud storage?

A

Increased security risk and reliance on access to high bandwidth network connection and cloud could cost more due to ongoing costs. Reliance on company providing the cloud service and increased chance of other accessing personal data so data privacy issues.

35
Q

How would regularly backing up data and test backups improve security?

A

Back up data so that you can restore data that has been accidentally deleted or destroyed. It is important to test that back-ups work on a regular basis.

36
Q

How would securing the backups improve security?

A

Make sure that backups are off site so they are not lost under the same circumstances as the main data. Also if the backups are air-gapped then this will prevent a severe malware infection getting access to the backups as there is no physical connection.

37
Q

How would blocking or remove email or attachment links improve security?

A

Check links contained in e-mails and do not open attachments included in unexpected emails.

38
Q

How would disabling pop ups improve security?

A

Ensure the pop-up blocker is turned on and any website screening options are also on.

39
Q

How would controlling software downloads improve security?

A

Only download software especially free software from sites you know and trust or prevent software downloads completely.

40
Q

How would ensuring software is up to date improve security?

A

Make sure all software is up to date and patched to prevent any exploitation of known vulnerabilities.

41
Q

How would making sure the anti-virus is up to date improve security?

A

Ensure anti virus automatically updates so the latest vulnerabilities are detected and dealt with.

42
Q

How would disabling macro scripts improve security?

A

Prevents macros from running which could cause or run malicious code.

43
Q

How would allowing only specific programs to run improve security?

A

Preventing any unknown programs running should prevent any malicious code before it gets a chance to run.

44
Q

How would managing the use of privileged accounts and access levels to files increase security?

A

Controlling the access to files should act as an internal firewall/barrier to prevent unauthorised access or execution of programs.

45
Q

How would using virtualised environments/sandboxes improve security?

A

Operations are carries out in a controlled and temporary working space/environment which can be easily reset without effecting anything outside of the space/environment.

46
Q

How would using network filtering or a firewall increase security?

A

Prevent/block access into and out of the network using filtering and firewall to stop any malicious communication or transfer of viruses.

47
Q

How would removing the ability to use removable media increase security?

A

Prevent unknown or unauthorised files to enter or leave the network.

48
Q

How would MAC address filtering improve security?

A

Can prevent access by unauthorised devices.

49
Q

How would user training improve security?

A

To educate staff in dangers of social engineering techniques and other unsafe practices.

50
Q

How would pen testing improve security?

A

Allow org to understand where weaknesses may be in order to strengthen their system security.

51
Q

Enctyption

A

Minimising damage.

52
Q

Trojan.

A

A program which misleads the user into thinking it is another piece of software which when run executes another program that could be malicious.

53
Q

Spyware.

A

A program which records data such as usernames and passwords on a host system and forwards the information to a third party.

54
Q

Adware,

A

Code embedded or attached to program files which will persistently show adverts that attempt to gain revenue.

55
Q

Worm.

A

Code which will run autonomously and replicates itself on a host system.

56
Q

Ransomware.

A

A program that encrypts user’s data to make it unreadable until they pay for the key.

57
Q

Remote access tool(RAT).

A

Allows access to control and monitor a computer from a remote network location.

58
Q

Rootkit.

A

Malware that has managed to gain root admin privileges.

59
Q

Bots/zombies.

A

A program installed on a computer that performs a job for the remote owner of the bot/zombie such as sending spam or sending web requests to perform a DOS or attacking a computer system.

60
Q

Scareware.

A

Malware that tells you something is wrong with your system in an attempt to ge you to make a purchase.

61
Q

Keylogger.

A

A program that monitors/records a users keystrokes in order to steal passwords/confidential details.