Loading documents preview...
it has been developed by ISO in the year 1984. OSI Reference Model It is a set of standards that are widely used as a basis for communication. protocol These layers work together to transmit the data from one person to another world wide OSI layer A type of malware that automatically sends advertisements to the users. Adware It is an act that exploits a vulnerability. attack these are what make networks prone to information loss and downtime Vulnerabilities It is anything that can disrupt the operation, functioning, integrity, or availability of a network or system threat This layer is also called human-computer interaction layer. Application Layer Type of malware that may contain an attachment to an email that loads malware onto your computer system. Phishing It provides data routing paths where data will take for network communication. Network Layer any program design to damage specific file or computer system. malware It pretends to be a legitimate programs in order to gain access to a system. trojan horse Which of the following are not part of OSI Layer? transfer layer This layer involves devices such as router, UTP Cables and other networking devices to transfer data. phiysical layer Two different devices can communicate with each other regardless of the manufacturer as long as they have the same protocol. true SQL stands for? Structured Query Language Worms can be classified as a type of computer virus that needs a third party or a user to replicate and spread through the system. false It may contain phishing scams and malware. spam
What are the signs and symptoms that your device/s are getting infected by any malware. (Choose all that applies) Select one or more: a. Increased CPU usage b. Appearance of strange desktop icons c. Software freezes or crashes d. Slower computer performance Brute force attack are often successful because most of the users uses different ordinary words as their passwords. false