What examines the traffic between user's computer and public network?
Firewall
1 of 12
True Or False. Hiding your personal information keeps you completely safe from an attack?
False
2 of 12
Which type of person poses the greatest threat to an organisation's security?
Disgruntled employee
3 of 12
What is a type of attack that sends enough requests to overload a resource or even stopping its operation?
Denial Of Service (DoS)
4 of 12
What is the common technique for scrambling messages sent between users?
Encryption
5 of 12
How Does Huffman Encoding work?
Huffman encoding is a compression technique that is used to reduce the number of bits required to store each letter. The more frequently a letter appears in the text, the fewer bits are used to represent it.
6 of 12
What is Encryption?
Encoding data being transferred to prevent a third party from intercepting the data.
7 of 12
What is ROM?
Read Only memory. Non Volatile. Contains the boot.
8 of 12
What is the Bootstrap loader?
A small program that is used to load the OS.
9 of 12
What is RAM?
Random Access Memory. Used to store software and programs in use as well as the operating system.
10 of 12
What is Virtual Memory?
A small part of the hard drive used as an extension to RAM.
11 of 12
What is cloud storage?
Cloud Storage refers to saving data in an offsite storage system maintained by a third party.
12 of 12
Other cards in this set
Card 2
Front
True Or False. Hiding your personal information keeps you completely safe from an attack?
Back
False
Card 3
Front
Which type of person poses the greatest threat to an organisation's security?
Back
Card 4
Front
What is a type of attack that sends enough requests to overload a resource or even stopping its operation?
Back
Card 5
Front
What is the common technique for scrambling messages sent between users?
Comments
No comments have yet been made