Created by Isaac Quinn
almost 8 years ago
|
||
What weaknesses does cyber crime exploit?
What is social engineering?
What is phishing?
How can you tell is it's a phishing email?
What is shoulder surfing?
What is a Brute-Force-Attack?
List three things never to include on a password.
What does technical weakness leave a computer vunerable to?
What is a virus?
What is a worm?
What leaves a computer techincally weak?
Explain why you should not put found USB sticks in your PC.
How can you minimise probles with a USB stroage devices?
What is penertration testing?
Name and explain he two types of box tesing.
Name the three types of hackers
What do each of the three hacker types do?
What is a Audit trail?
Whats a network policy?
Name some rules for setting passwords.
How else can you protect data?
What are access levels?
What are the two types of system software?
Whats are the three types of system software?
Name 7 types of Operating systems.
Define Operating System.
What are the functions of an operating system?
What types of user interface are there?
What is WIMP?
What is a hardware Interrupt?
What does Encrytion software do?
What is file management and trasfer?
What is file defragmentation?
What does compression software doe and why?
Why do people backup?
What are the two backup methods and what do they do?