Student Text Flashcards
What are the standard computer capabilities and characteristics?
- Speed
- Accuracy
- Diligence
- Versatility
What is the fastest possible speed for information transmission?
Speed of light
What is limited by the efficiency of the programmed algorithms being computer and system components?
Computer speed
What is a personal computer that may of may not be connected to a network?
Workstation
What are the different types of client workstations?
- Thin client
- Thick client
What is a software program or actual computer relying heavily on another computer to do most of its work?
Thin client
What operates on a network with client software or computer acting as an interface & the network doing all the processing work?
Thin client
What is a workstation computer in a client server configuration functioning independent of the server?
Thick client
What pulls some data from a central server and may run on its own without being connected to the server?
Thick client
What is a computer on a network managing shared resources for other systems on the network?
A server
What are some common types of servers?
- Application
- Catalog
- Database
- DHCP
- File
- Proxy
- Web
What is a computer system weakness that is open to exploitation?
Vulnerability
What is a possible danger that may take advantage of a vulnerability?
Threat
What is the likelihood that a threat will take advantage of a vulnerability?
Risk
What are some types of malicious code?
- Viruses
- Worms
- Logic bombs
- Spyware
- Adware
- Rootkits
- Botnets
What is code that spreads from one computer to another by attaching itself to other files?
A virus
What is code that spreads from one computer to another on its own but not by attaching itself to another file?
A worm
What is code that sits dormant on a target computer until it’s triggered by a specific event?
A logic bomb
What stealthily installs malicious software intended to track and report data from a target system?
Spyware
What is software that automatically displays or downloads advertisements?
Adware
What is code intended to take full of partial control of a system at low levels?
A rootkit
What is a collection of software robots run by a command & control (C2) program which in turn is controlled by a person?
A botnet
What are some common causes of vulnerabilities?
- Configuration/familiarity
- Implementation
- Design
What can a system or application misconfiguration cause?
A vulnerability