Ovido
Sprache
  • Englisch
  • Spanisch
  • Französisch
  • Portugiesisch
  • Deutsch
  • Italienisch
  • Niederländisch
  • Schwedisch
Text
  • Großbuchstaben

Benutzer

  • Anmelden
  • Konto erstellen
  • Auf Premium upgraden
Ovido
  • Startseite
  • Einloggen
  • Konto erstellen

Computer Science Test 3

What is malware?

Malware (malicious software) is any program or file designed to harm a computer system, such as viruses, worms, trojans, spyware, and ransomware.

What is a phishing attack?

Phishing is a method where attackers send fake emails or messages to trick people into revealing personal information like passwords or bank details.

What is a denial of service (DoS) attack?

A DoS attack floods a network or server with traffic to overwhelm it, making it unavailable to users.

What is a brute force attack?

It’s an attack that repeatedly tries different passwords or PINs until the correct one is found, often using automated software.

What is social engineering in cyber security?

Social engineering is manipulating people into giving up confidential information, often by pretending to be someone trustworthy.

How can firewalls help protect against network threats?

A firewall blocks unauthorized access to a network while allowing outward communication, acting as a filter for incoming and outgoing traffic.

What is encryption and how does it help?

Encryption converts data into a coded format that only authorized users can understand, protecting it from hackers.

What is penetration testing?

It's a method of testing a network’s security by simulating an attack to find vulnerabilities.

What is anti-malware software?

Software designed to detect, prevent, and remove malware from a computer system.

What is network forensics?

Network forensics involves monitoring and analyzing computer network traffic to detect and investigate security breaches.

What is a virus in computing?

A virus is a type of malware that attaches itself to files or programs and spreads when the infected file is opened or run.

What is spyware?

Spyware secretly monitors user activity, often recording keystrokes to steal information like passwords or credit card numbers.

What is a Trojan horse?

A Trojan appears to be a legitimate program but contains malicious code that can damage data or give hackers access to the system.

What is ransomware?

Ransomware locks or encrypts a user’s data and demands payment to restore access.

What is adware?

Adware is software that displays unwanted ads and can sometimes track user behavior for targeted marketing.

How does a worm differ from a virus?

A worm is a standalone malware that can spread itself across networks without needing to attach to a file or program.

What is authentication?

Authentication is the process of verifying the identity of a user, usually through passwords, PINs, or biometrics.

What is packet sniffing?

Packet sniffing is monitoring and capturing data packets on a network—can be used legally or maliciously.

What is a network protocol?

A network protocol is a set of rules that define how data is transmitted and received over a network.

What is the purpose of HTTPS?

HTTPS encrypts communication between a user’s browser and a website, ensuring data privacy and integrity.

What is a protocol in computer networks?

A protocol is a set of rules that determines how data is transmitted and received across a network.

What is HTTP?

HTTP (Hypertext Transfer Protocol) is used to transfer web pages from a server to a client (browser).

What is HTTPS and how is it different from HTTP?

HTTPS (HTTP Secure) encrypts the data sent between the server and the client, making it secure against hackers.

What is FTP?

FTP (File Transfer Protocol) is used to transfer files between computers over a network.

What is SMTP used for?

SMTP (Simple Mail Transfer Protocol) is used to send emails from a client to a mail server or between mail servers.

What is IMAP?

IMAP (Internet Message Access Protocol) is used to manage and access emails on a mail server without deleting them, allowing syncing across devices.

What is the purpose of TCP?

TCP (Transmission Control Protocol) ensures data is sent and received accurately and in the correct order.

What is IP in networking?

IP (Internet Protocol) is responsible for addressing and routing packets of data so they reach the correct destination.

What does the TCP/IP protocol stack do?

The TCP/IP stack is a set of protocols that work together to send and receive data over the internet reliably and efficiently.

What is DNS?

DNS (Domain Name System) translates website names (like google.com) into IP addresses that computers use to locate each other.

What is a MAC address?

A MAC (Media Access Control) address is a unique identifier assigned to network devices, used for local communication.

Why are different protocols used in networking?

Different protocols are designed for specific tasks (e.g., sending emails, browsing web pages), helping networks run efficiently and securely.

You're in an office where staff receive lots of external emails. What threat might this present, and how would you protect the team?

Phishing. Train staff to spot suspicious emails and use email filters and anti-phishing software.

A coworker clicks on a pop-up ad and downloads a program. What risk does this pose, and how could it be prevented?

Risk of malware. Prevent this by installing anti-malware software and blocking pop-ups in browser settings.

Your office stores customer data on a shared network. How can you stop unauthorized staff from accessing it?

Use access levels and permissions to restrict who can view or edit sensitive files.

Quiz
oihanabac
Frankreich in der Welt
estructura
classification
geometria solida
Voyage en martinique
KA 2
giver
Biologie: DNADNA und weiteres
Region IX-XIV
Region IV-B TO VIII
ki5
Music signs
storia educazione
Iris, cillarkropp, främre och bakre kammare samt ögonlinsen (Bertil Sterner)
EliMathe
Provet i mekanik.
5 vamos y a
svåra ord, sugning av lufväggar och syregasbehandling
bio
english essential words
english
spanska läs
leonie
Social Omsorg
bio paper 1
Tyska ord invandring
geschichte 1WK
Music Terms
gemeindsvhaftskunde
människors miljöer - kopia
Probe
Mathe FormelnLernen auswendig --> Formeln Kegel und Pyramiden
Powi 2Fragen
französisch
dunstan test
tarjetas francésverbos en futuro simple y presente simple en frances los poseedores
Unterkunft
dove? wohin?
människors miljöer
Erfelijkheid en evolutie
Van generatie op generatie
Lektion 1
Reageren op prikkels
het lichaam in stand houden
planten en dieren en hun samenhang
La Casa (unità 5)
cellen staan aan de basis
새 단어 16과 3급
hej - kopia
Traduce_ semana_20semana 19(solo dos frases) y 20
Latín
Lighting in OCG
del 2 biologi förhör
Latein Vok 16
Latein Vok 17
Latein Vok 18
valemid
prüfung
Finals
fisicapara examen
ki1
spanisch vokabelnvokabeln
eliana
vokabelnka
chemie
Franska resmässa bra uttryck
Biokemi 6.3 Proteiner
Franska resmässa svara på frågor
Franska resmässa frågor
Geschichts Kurzarbeit
Chimie: Transformation chimique
le match de football
geschichte
emerald
Aoristo Il
männikskors miljöer
physik
COMPARATIVE AND SUPERLATIVE ADJETIVESGrammar_ folder_UNIT6
EnglishStudying English
chemie
unit 11 study guide
SpanischHier lerne ich
Sklera och Konjungtiva mm (Oscars föreläsning)
g
PowiBundesverfassungsgericht
Valemid
chemi
tilgung
ir tegusonad
prefixes
unternehmensformen
ap