Grade 11 Term 1 Flashcards

1
Q

What is the biggest threat to your computer?

A

HUMAN ERROR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common errors made by people include:

A

● Giving sensitive information to the wrong people
● Writing down your passwords
● Using the same password for all your accounts
● Choosing an insecure password
● Clicking on links provided in emails without first verifying them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of GIGO?

A

So if someone obtains your infomation and tries to use it, it would be incorrect. `

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is GIGO?

A

“Garbage In, Garbage Out”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are ways to prevent people from getting physical access to your data?

A

● Do not leave your storage devices unattended in public spaces such as in school computers.
● Make regular backups of your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can hardware faliure resultin data loss?

A

mechanical damages of hard drive
power failures
spilling coffee, and other water damages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Def. Trojan

A

A Trojan is a type of malware that is often disguised as useful software. Trojans can be used to gain
access to users’ systems. Users are tricked by social engineering executing the Trojan on their
system. Once activated, Trojans can enable cyber-criminals to gain backdoor access to your system.
One of the most dangerous types of trojan horses is called a keylogger, which recordskeystrokes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Def. Virus

A

A computer virus is malicious software that is loaded onto a user’s computer without their knowledge, replicates itself and performs malicious actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Def. Phishing

A

Phishing attacks try to obtain sensitive information (such as usernames, passwords and banking
details) by sending emails to users that look like official emails. This is often used with email spoofing
to convince victims that they email is from a legitimate source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Def. Worm

A

A computer worm is a type of malware that spreads copies of itself from one computer to another.
A worm can replicate itself without any action from the user and it does not need to attach itself to
another program to cause damage. Worms will scan a network for open ports and use those openings
to spread through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Def. Rootkit

A

Rootkit is malware that is designed to infect a computer and allow an attacker to install a set of tools
that grant him remote access to the computer. The rootkit is hidden within the operating system and
will be designed to hide from anti-malware applications. Rootkits act as a backdoor that gives the
attacker the ability to connect remotely to the infected machine whenever he chooses and remove or
install specific components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Def. Email Spoofing

A

With spoofing, the attacker disguises an email to pretend that the email is sent from a known, trusted
source. For example, the attacker might send emails that appear to come from you to your friends
and family with an urgent request for money while providing their own banking details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Def. email Pharming

A

Pharming attacks create an official-looking website that requests sensitive information. A very
common pharming attack allows users to “change” their passwords. Instead of changing their
passwords, the user’s username and password is recorded and their account is taken over.
Pharming involves malicious code being is installed on a computer or server, which misdirects users
to a fraudulent website even when the type the correct address, that requests sensitive information
such as passwords and banking details which are then stolen by the cyber-criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Def. Malware

A

Malicious software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TYPES OF BACKUPS

A

FULL BACKUP
DIFFERENTIAL BACKUP
INCREMENTAL BACKUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FULL BACKUP

A

A full backup is when a copy is made of every single file and folder in the system.
A full backup takes longer and uses more storage space than other types of
backups but restoring data from the backup is faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DIFFERENTIAL BACKUP

A

Differential backups start with a full backup and after that copies those files that
have been changed since the full backup took place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

UNINTERRUPTIBLE POWER SOURCE (UPS)

A

An uninterruptible power supply (UPS) is a device that allows a computer to keep
running for a short time when power is lost due to a power failure. UPS devices
also provide protection from power surges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

INCREMENTAL BACKUP

A

Incremental backups also start with a full backup. After that, a copy of the files
that have changed since the last backup is made, whether it was a full or
incremental copy.

17
Q

LOCAL BACKUP

A

Local backups are made on a storage medium that is kept in the same location
as the original data. It could be on an external hard drive or Network Attached
Storage (NAS).

17
Q

OFFSITE BACKUP

A

When the backup storage media is kept at a different location from the source,
this is known as an offsite backup.

18
Q

How to make a hard PASSWORD

A

at least 8 characters
Use a mixture of both uppercase and lowercase letters
at least one special character
numbers

18
Q

FIREWALL

A

A firewall is hardware, software or a combination of both, that monitors incoming
and outgoing traffic on a network. The firewall decides whether to stop the traffic
based on a set of predefined security rules. Its purpose is to create a barrier
between an internal network and incoming traffic from external sources to block
potentially malicious traffic.