OCR 1.5 Flashcards

1
Q

Define malware.

A

Malware (malicious software) is any software that has been created with malicious intent to cause harm to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus?

A

A virus is a program which can replicate itself on a user’s computer and contains code that will cause unwanted and unexpected events to occur, such as corrupting files, deleting data, or preventing applications from running correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False?

Worms are similar to viruses but can spread to other drives and computers on the network.

A

True.

Worms are similar to viruses, with the main difference being that they will spread to other drives and computers on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Trojan?

A

A Trojan, sometimes also called a Trojan Horse, is a type of malware that disguises itself as legitimate software but contains malicious code in the background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define spyware.

A

Spyware is software that allows a person to spy on the users’ activities on their devices, such as recording the screen, logging keystrokes, and gaining access to passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ransomware?

A

Ransomware is a form of malware that locks your computer or device and encrypts your documents and other important files, often demanding money to receive the password that will allow the user to decrypt the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define social engineering.

A

Social engineering is exploiting weaknesses in a computer system by targeting the people that use or have access to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does phishing mean?

A

Phishing is a form of social engineering where fraudulent emails are sent to a large number of email addresses, claiming to be from a reputable company or trusted source, to try and gain access to the recipient’s details, often by coaxing them to click on a login button.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False?

Human errors, such as not locking doors to computer/server rooms or sharing passwords, can lead to significant security issues.

A

True.

Human errors, such as not locking doors to computer/server rooms or sharing passwords, can lead to significant security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define brute-force attack.

A

A brute-force attack is a method where an attacker repeatedly tries multiple combinations of a user’s password to try and gain unauthorised access to their accounts or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a denial of service attack (DOS attack)?

A

A denial of service attack (DOS attack) occurs when an attacker repeatedly sends requests to a server to flood the server with traffic, causing it to overload and become unusable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False?

A distributed denial of service (DDOS) attack involves traffic coming from multiple distributed devices in a coordinated attack on a single server/network.

A

True.

A distributed denial of service (DDOS) attack involves traffic coming from multiple distributed devices in a coordinated attack on a single server/network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define data interception and theft.

A

Data interception and theft is when thieves or hackers can compromise usernames, passwords, and other sensitive data by using devices such as a packet sniffer to collect the data being transferred on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SQL?

A

SQL (Structured Query Language) is a language used to create, access, and manipulate a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is SQL injection?

A

SQL injection is entering an SQL command into a web text field to manipulate the SQL query, with the goal of inserting, modifying, or deleting data from the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define penetration testing

A

Penetration testing is a method of identifying vulnerabilities whereby a company employs people to try and hack their network and databases, allowing them to fix any issues found.

17
Q

What form of attack would penetration testing help to prevent?

A

Penetration testing would help to prevent SQL injection attacks.

18
Q

What is anti-malware software?

A

Anti-malware software is a combination of different software, such as anti-virus, anti-spam, and anti-spyware, to prevent computers from being susceptible to viruses and other malicious software.

19
Q

True or False?

Anti-malware software scans email attachments, websites, and downloaded files to detect and block malware.

A

True.

Anti-malware software scans email attachments, websites, and downloaded files to search for issues and block malware based on known signatures.

20
Q

Define firewall.

A

A firewall is a barrier between a network and the internet that filters requests and prevents unwanted traffic from entering the network.

21
Q

What forms of attack would a firewall prevent?

A

A firewall would help prevent hackers, malware, unauthorised access to a network, and DOS/DDOS attacks.

22
Q

What are user access levels?

A

User access levels ensure users of a network have designated roles and access restrictions, such as unrestricted access for administrators, partial access for teaching staff, and restricted access for students.

23
Q

Define password.

A

A password is a digital lock that prevents unauthorised access to an account, often stored as encrypted text in a database.

24
Q

What forms of attack would user access levels and passwords prevent?

A

User access levels and passwords would help prevent data interception and theft, as well as SQL injection attacks.

25
Q

Define encryption.

A

Encryption is a method of converting plain text into ciphered text using complex mathematical algorithms to scramble the data.

26
Q

True or False?

Encryption prevents all forms of attacks on a network.

A

False.

Encryption does not prevent attacks from occurring, but it stops the attacker from gaining access to the information.

27
Q

What is physical security?

A

Physical security refers to measures that physically prevent access to parts of a network, such as locked doors, biometrics, and surveillance cameras.

28
Q

What forms of attack would physical security prevent?

A

Physical security would help prevent data interception and theft, as well as social engineering attacks.

29
Q

Define anti-virus software.

A

Anti-virus software is a type of anti-malware software specifically designed to detect and remove computer viruses.