Net Sec Q2

  • Uploaded by: John Hector Sayno
  • 0
  • 0
  • February 2021
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Net Sec Q2 as PDF for free.

More details

  • Words: 320
  • Pages: 2
Loading documents preview...
it has been developed by ISO in the year 1984. OSI Reference Model It is a set of standards that are widely used as a basis for communication. protocol These layers work together to transmit the data from one person to another world wide OSI layer A type of malware that automatically sends advertisements to the users. Adware It is an act that exploits a vulnerability. attack these are what make networks prone to information loss and downtime Vulnerabilities It is anything that can disrupt the operation, functioning, integrity, or availability of a network or system threat This layer is also called human-computer interaction layer. Application Layer Type of malware that may contain an attachment to an email that loads malware onto your computer system. Phishing It provides data routing paths where data will take for network communication. Network Layer any program design to damage specific file or computer system. malware It pretends to be a legitimate programs in order to gain access to a system. trojan horse Which of the following are not part of OSI Layer? transfer layer This layer involves devices such as router, UTP Cables and other networking devices to transfer data. phiysical layer Two different devices can communicate with each other regardless of the manufacturer as long as they have the same protocol. true SQL stands for? Structured Query Language Worms can be classified as a type of computer virus that needs a third party or a user to replicate and spread through the system. false It may contain phishing scams and malware. spam

What are the signs and symptoms that your device/s are getting infected by any malware. (Choose all that applies) Select one or more: a. Increased CPU usage b. Appearance of strange desktop icons c. Software freezes or crashes d. Slower computer performance Brute force attack are often successful because most of the users uses different ordinary words as their passwords. false

Related Documents

Net Sec Q2
February 2021 1
Q2
February 2021 2
Programador Net
January 2021 1
Slm_ro_mil-q2 Module 5
February 2021 1
Diorama Net
January 2021 1
Net Case
January 2021 1

More Documents from "Anonymous KR79Kr5"