What is the purpose of systems software? - correct answer Software designed to run or maintain a computer
Describe the functionality of systems software. - correct answer It controls the operations of computer hardware
What is an operating system? - correct answer A piece of software responsible for running the computer, managing hardware, applications, users and resources
What are the 5 things that operating systems are used for? - correct answer providing a UI, memory management/multitasking, peripheral management and drivers, user management, file management
What is utility software? - correct answer Software designed to help maintain a computer system
What is encryption software? - correct answer Software used for encrypting data
What is defragmentation software? - correct answer Reorganising data on a hard drive to put broken up files back together and collect up the free space
What is data compression? - correct answer The process of making the size of a file smaller
Give the 2 types of backup. - correct answer full and incremental
What is Hacking? - correct answer Illegal access or attack on a computer network or device
What is malware? - correct answer Malicious software created to damage or gain illegal access to computer systems What is Phishing? - correct answer When criminals send emails or text to someone claiming to be a well-
known business.
Describe social engineering. - correct answer A way of gaining illegal access to data or networks by influencing people.
What is a Brute Force Attack? - correct answer A network attack which uses software to crack security passwords through trial and error.
What is a Denial of Service attack? - correct answer A network attack which stops users from accessing a part of a network or website.
What is data interception and theft? - correct answer When data is intercepted when travelling across a network. This can be done through packet sniffing or having a wireless connection.
What is SQL injection? - correct answer A piece of SQL code which can be typed into an input box to try and attack the SQL database
Give an example of a poor network policy. - correct answer unencrypted data, no user access levels, no passwords, no anti-malware or firewall software
What is penetration testing? - correct answer The process of simulating attacks on a network to identify its weaknesses
What does network forensics involve? - correct answer monitoring the traffic on a network
What is a network policy? - correct answer A set of rules and procedures an organisation will follow to ensure their network is protected against attacks
What is anti-malware software? - correct answer Software designed to stop malware from damaging a computer or network