凹凸雅思

identifying and preventing threats to computer systems and networks

使用闪卡高效复习COMPUTER-SCIENCE科目知识点

共计闪卡

29

闪卡自测

进度: 1 / 29已掌握: 0 | 需要复习: 0
问题

Define malware.

点击查看答案
请先阅读问题,然后点击卡片查看答案

所有闪卡

闪卡 1

问题

Define malware.

查看答案

答案

Malware (malicious software) is any software that has been created with malicious intent to cause harm to a computer system.

闪卡 2

问题

What is a virus?

查看答案

答案

A virus is a program which can replicate itself on a user's computer and contains code that will cause unwanted and unexpected events to occur, such as corrupting files, deleting data, or preventing applications from running correctly.

闪卡 3

问题

True or False? Worms are similar to viruses but can spread to other drives and computers on the network.

查看答案

答案

True. Worms are similar to viruses, with the main difference being that they will spread to other drives and computers on the network.

闪卡 4

问题

What is a Trojan?

查看答案

答案

A Trojan, sometimes also called a Trojan Horse, is a type of malware that disguises itself as legitimate software but contains malicious code in the background.

闪卡 5

问题

Define spyware.

查看答案

答案

Spyware is software that allows a person to spy on the users' activities on their devices, such as recording the screen, logging keystrokes, and gaining access to passwords.

闪卡 6

问题

What is ransomware?

查看答案

答案

Ransomware is a form of malware that locks your computer or device and encrypts your documents and other important files, often demanding money to receive the password that will allow the user to decrypt the files.

闪卡 7

问题

Define social engineering.

查看答案

答案

Social engineering is exploiting weaknesses in a computer system by targeting the people that use or have access to them.

闪卡 8

问题

What does phishing mean?

查看答案

答案

Phishing is a form of social engineering where fraudulent emails are sent to a large number of email addresses, claiming to be from a reputable company or trusted source, to try and gain access to the recipient's details, often by coaxing them to click on a login button.

闪卡 9

问题

True or False? Human errors, such as not locking doors to computer/server rooms or sharing passwords, can lead to significant security issues.

查看答案

答案

True. Human errors, such as not locking doors to computer/server rooms or sharing passwords, can lead to significant security issues.

闪卡 10

问题

Define brute-force attack.

查看答案

答案

A brute-force attack is a method where an attacker repeatedly tries multiple combinations of a user's password to try and gain unauthorised access to their accounts or devices.

闪卡 11

问题

What is a denial of service attack (DOS attack)?

查看答案

答案

A denial of service attack (DOS attack) occurs when an attacker repeatedly sends requests to a server to flood the server with traffic, causing it to overload and become unusable.

闪卡 12

问题

True or False? A distributed denial of service (DDOS) attack involves traffic coming from multiple distributed devices in a coordinated attack on a single server/network.

查看答案

答案

True. A distributed denial of service (DDOS) attack involves traffic coming from multiple distributed devices in a coordinated attack on a single server/network.

闪卡 13

问题

Define data interception and theft.

查看答案

答案

Data interception and theft is when thieves or hackers can compromise usernames, passwords, and other sensitive data by using devices such as a packet sniffer to collect the data being transferred on a network.

闪卡 14

问题

What is SQL?

查看答案

答案

SQL (Structured Query Language) is a language used to create, access, and manipulate a database.

闪卡 15

问题

What is SQL injection?

查看答案

答案

SQL injection is entering an SQL command into a web text field to manipulate the SQL query, with the goal of inserting, modifying, or deleting data from the database.

闪卡 16

问题

Define penetration testing.

查看答案

答案

Penetration testing is a method of identifying vulnerabilities whereby a company employs people to try and hack their network and databases, allowing them to fix any issues found.

闪卡 17

问题

What form of attack would penetration testing help to prevent?

查看答案

答案

Penetration testing would help to prevent SQL injection attacks.

闪卡 18

问题

What is anti-malware software?

查看答案

答案

Anti-malware software is a combination of different software, such as anti-virus, anti-spam, and anti-spyware, to prevent computers from being susceptible to viruses and other malicious software.

闪卡 19

问题

True or False? Anti-malware software scans email attachments, websites, and downloaded files to detect and block malware.

查看答案

答案

True. Anti-malware software scans email attachments, websites, and downloaded files to search for issues and block malware based on known signatures.

闪卡 20

问题

Define firewall.

查看答案

答案

A firewall is a barrier between a network and the internet that filters requests and prevents unwanted traffic from entering the network.

闪卡 21

问题

What forms of attack would a firewall prevent?

查看答案

答案

A firewall would help prevent hackers, malware, unauthorised access to a network, and DOS/DDOS attacks.

闪卡 22

问题

What are user access levels?

查看答案

答案

User access levels ensure users of a network have designated roles and access restrictions, such as unrestricted access for administrators, partial access for teaching staff, and restricted access for students.

闪卡 23

问题

Define password.

查看答案

答案

A password is a digital lock that prevents unauthorised access to an account, often stored as encrypted text in a database.

闪卡 24

问题

What forms of attack would user access levels and passwords prevent?

查看答案

答案

User access levels and passwords would help prevent data interception and theft, as well as SQL injection attacks.

闪卡 25

问题

Define encryption.

查看答案

答案

Encryption is a method of converting plain text into ciphered text using complex mathematical algorithms to scramble the data.

闪卡 26

问题

True or False? Encryption prevents all forms of attacks on a network.

查看答案

答案

False. Encryption does not prevent attacks from occurring, but it stops the attacker from gaining access to the information.

闪卡 27

问题

What is physical security?

查看答案

答案

Physical security refers to measures that physically prevent access to parts of a network, such as locked doors, biometrics, and surveillance cameras.

闪卡 28

问题

What forms of attack would physical security prevent?

查看答案

答案

Physical security would help prevent data interception and theft, as well as social engineering attacks.

闪卡 29

问题

Define anti-virus software.

查看答案

答案

Anti-virus software is a type of anti-malware software specifically designed to detect and remove computer viruses.