T4 - MS Flashcards
Describe the threat malware can pose to a network and give a prevention method
can delete/corrupt files/data
can change files/data
anti-malware
Describe the threat a brute force attack can pose to a network and give a prevention method
gains access to user’s account//access
your password
…can access (private/confidential)
data
firewall
strong password
Unauthorised access to
computer
prevention
Firewall
Virus
prevention
Anti-virus/malware
Phishing
prevention
spam filter
firewall
Data interception prevention
encryption
Name two other threats to the data in a computer system and give a method of preventing each.
Spyware (1) anti-spyware (1)
Pharming (1) Check web address is
valid(1)
Hardware failure/loss (1) Backup (1)
Describe the problems that can arise from unauthorised access to his laptop and confidential documents.
Malware could be put on the computer
Data protection legislation states
personal data must be protected /
breaks Data protection legislation
… breach of privacy
Describe two ways to prevent unauthorised access to his laptop.
Password
No access without the password
Monitor incoming and outgoing
transmissions
Give two reasons why the library should use encryption.
Data cannot be understood if
intercepted
So that only authorised users can
access the confidential material
Identify two methods of physical security that the company could use to protect their computer systems.
Locks
Keycard entry
Biometric entry to room
CCTV
Identify and describe two software-based security methods
Anti-malware
Scans for / identifies
virus/spyware/malware
Firewall
Scans incoming and outgoing
traffic
Encryption
scrambles data - cannot be understood
Identify three ways that Xander can make use of the file management facility.
He can place his files into
folders/directories
He can (re)name files/folders
He can move his files/folders
Explain how the compression software will compress the image file.
- Use an algorithm
.- ..to remove repeated/unnecessary
data - Could use lossy/lossless
- lossless will not remove data
permanently - lossy is permanent deletion
- reduce number of pixels
Give the name of two other types of utility system software.
Defragmentation software
Encryption software
Backup software
Firewall
Explain how defragmentation will change how the files and free space
Collate free space together
Collate file fragments together/contiguously
All of file 1 will be stored consecutively
Explain why Ali’s computer can access the files faster after defragmentation.
When one page is read it does not
have to search for second page
Does not have to physically move as
far to get the next part of the file
Less physical movement saves time
State the purpose of utility system software.
Perform housekeeping/maintenance tasks
Explain the reasons why Layla performs both full and incremental backups.
full backup will copy every file and all
data
incremental will only copy files/data
that have changed
…incremental can only be done once a
full backup has been completed
…reduces time taken to backup each
time
Identify and describe two functions of an operating system.
user interface
allows the user to communicate with
the hardware
allows user to input data
memory management / multitasking
moves data between RAM and VM
gets data from RAM
stores data to RAM