Topic 8: Security Risks and Precautions Flashcards

1
Q

Networks can be structured as

A

peer-to-peer or Client-server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A peer to peer network is used for

A

a small number of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advantages of a peer to peer network is that they are

A

relatively inexpensive to set up and less cable is need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disadvantages of peer to peer networks is

A

that each computer needs to be backed up individually, the network is less secure, software updates must be done individually and no shared access to printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Client server network is used for

A

a larger network of computers. One central computer called a server manages the other client computers on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advantages of a client server network are;

A

all computers are backed up centrally, network more secure, software updates can be done remotely and shared access to printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Disadvantages of a client server network are;

A

Relatively expensive to setup, more cable needed and network fails if server goes down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud storage is a form of

A

data storage offered by firms like Google.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advantages of cloud storage are

A

accessible from any device via internet and security and backup provided as part of the service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disadvantages of cloud storage are;

A

without internet connection no data can be accessed, can be more expensive than conventional storage per Gb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A virus is a

A

program which copies itself, then it attaches itself to various programs inside the computer. This damages the programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worm is similar to a virus because it

A

makes copies of itself but these copies accumulate in the memory of your computer until there is no free memory left and the computer freezes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Trojan horse usually shortened to Trojan is

A

a program which damages your computer system but it doesn’t make copies of itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples of Trojan activity include

A

unwanted adverts on browser windows, installing unwanted toolbars and changing the browser homepage or default search engine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacking is

A

unauthorized access to any computer system/network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hacking may involve either

A

theft of data or modification of data.

17
Q

Hacking is punishable by up to

A

7 years imprisonment under the Computer Misuse Act

18
Q

Ant virus software is a collection of

A

programs which are used to prevent damage to computer systems/networks by malware

19
Q

Some examples of anti virus software are

A

firewall, email scanner, drive scanner, anti-malware, anti-spyware and parental controls

20
Q

A firewall is a program which has

A

a set of rules it uses to stop unauthorized access to your computer system/network

21
Q

Spyware is any software that

A

covertly gathers user information through the user’s internet connection without his or her knowledge usually for advertising purposes.

22
Q

Phishing is the act of

A

sending an email to a user falsely claiming to be a legitimate business in an attempt to scam the user into surrendering private information that will be used for identity theft.

23
Q

A phishing email usually directs the user to a

A

web site where they are asked to update personal information such as passwords and credit card details.