Security

Descripción

Homework
13de'athd
Fichas por 13de'athd, actualizado hace más de 1 año
13de'athd
Creado por 13de'athd hace casi 9 años
23
0

Resumen del Recurso

Pregunta Respuesta
What affect does having your OS updated have on protecting your computer? There is a lower risk that a security flaw can be exploited by a worm etc! :)
What is commonly used for Trojan activity? Mods for games! :)
How does having a 'off-line backup' protect against Ransomware? Having the off-line backup ensures that you have all the files that have been stolen so you wont have to pay for the ransom! :)
What is a UPS? Uninterruptable Power Supply! :)
What does DoS Stand for? Denial of service! :)
Give an example of a Physical threat. Fire, Floods, earthquakes etc. :)
What can a Worm do that a Virus cannot? Travel between computers without human action. :)
What is sometimes distributed as a Trojan? Spyware! :)
Name 1 anonymous payment method. Bitcoin! :)
What is Spear-phishing? The same as regular phishing however it only targets one user! :)
How do you protect yourself from dictionary attacks? Use Strong and long passwords! :)
What Precautions should you take towards phishing? Check emails for errors; most phishing emails are badly written! :)
What does a dDoS attack use? A whole network of infected computers called a 'botnet' :)
Why should you monitor your internet connection? If it is slow, you may have a worm which is trying to spread to other computers (this can be detected by the internet!) :)
Why is Adware Annoying? it can interfere with your browsing experience and make lots of popups! :)
What does Ransomware do without the user knowing? It encrypts all of their files and then runs the ransom program. :)
Which threat of data security can carry different payloads? Trojans! :)
True or False?: Hacking is the authorized access into a computer system. False! :)
What is a Virus and what does it do? A Virus is a program which copies itself to 'clean' files! :)
True or False?: A Worm sniffs a network to see which computers are connected. True! :)
Why do the creators of Ransomware use Bitcoins? So they cannot be traced. :)
Mostrar resumen completo Ocultar resumen completo

Similar

CCNA Security Final Exam
Maikel Degrande
Common Technology Terms
Julio Aldine Branch-HCPL
Project Communications Management
farzanajeffri
Network Protocols
Shannon Anderson-Rush
Security Guard Training
Summit College
Abstraction
Shannon Anderson-Rush
Computing
Kwame Oteng-Adusei
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
ISACA CISM Exam Glossary
Fred Jones
Introduction to the Internet
Shannon Anderson-Rush
Construcción de software
CRHISTIAN SUAREZ