T4 - MS Flashcards

1
Q

Describe the threat malware can pose to a network and give a prevention method

A

can delete/corrupt files/data
can change files/data

anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the threat a brute force attack can pose to a network and give a prevention method

A

gains access to user’s account//access
your password
…can access (private/confidential)
data

firewall
strong password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unauthorised access to
computer
prevention

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Virus
prevention

A

Anti-virus/malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing
prevention

A

spam filter
firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data interception prevention

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name two other threats to the data in a computer system and give a method of preventing each.

A

Spyware (1) anti-spyware (1)
Pharming (1) Check web address is
valid(1)
Hardware failure/loss (1) Backup (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the problems that can arise from unauthorised access to his laptop and confidential documents.

A

Malware could be put on the computer
Data protection legislation states
personal data must be protected /
breaks Data protection legislation
… breach of privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe two ways to prevent unauthorised access to his laptop.

A

Password
No access without the password

Monitor incoming and outgoing
transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give two reasons why the library should use encryption.

A

Data cannot be understood if
intercepted

So that only authorised users can
access the confidential material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify two methods of physical security that the company could use to protect their computer systems.

A

Locks
Keycard entry
Biometric entry to room
CCTV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify and describe two software-based security methods

A

Anti-malware
Scans for / identifies
virus/spyware/malware

Firewall
Scans incoming and outgoing
traffic

Encryption
scrambles data - cannot be understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identify three ways that Xander can make use of the file management facility.

A

He can place his files into
folders/directories
He can (re)name files/folders
He can move his files/folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain how the compression software will compress the image file.

A
  • Use an algorithm
    .- ..to remove repeated/unnecessary
    data
  • Could use lossy/lossless
  • lossless will not remove data
    permanently
  • lossy is permanent deletion
  • reduce number of pixels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give the name of two other types of utility system software.

A

Defragmentation software
Encryption software
Backup software
Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain how defragmentation will change how the files and free space

A

Collate free space together

Collate file fragments together/contiguously
All of file 1 will be stored consecutively

17
Q

Explain why Ali’s computer can access the files faster after defragmentation.

A

When one page is read it does not
have to search for second page

Does not have to physically move as
far to get the next part of the file

Less physical movement saves time

18
Q

State the purpose of utility system software.

A

Perform housekeeping/maintenance tasks

19
Q

Explain the reasons why Layla performs both full and incremental backups.

A

full backup will copy every file and all
data
incremental will only copy files/data
that have changed
…incremental can only be done once a
full backup has been completed
…reduces time taken to backup each
time

20
Q

Identify and describe two functions of an operating system.

A

user interface
allows the user to communicate with
the hardware
allows user to input data

memory management / multitasking
moves data between RAM and VM
gets data from RAM
stores data to RAM