Study

Unit 22 - Learning Aim A

  •   0%
  •  0     0     0

  • I’m a way to access a network securely over the internet — I encrypt your connection end to end.
    VPN (Virtual Private Network)
  • I secretly watch what you type, recording passwords and messages
    Keylogger
  • I make sure your computer doesn’t overheat while working hard.
    Cooling fan / heat sink
  • I trick users into giving away passwords using fake websites or emails.
    Phishing
  • I back up your data regularly so it’s safe even if your system fails.
    Backup
  • I make data unreadable to anyone without the right key.
    Encryption
  • I’m the part of your system that turns mains electricity into usable computer power.
    Power Supply Unit (PSU)
  • I spread by copying myself through files and networks — I’m infectious.
    Computer virus
  • I occur when staff share one login for convenience — attackers love me.
    Shared user credentials
  • I hide inside files or programs, pretending to be useful — but once opened, I attack.
    Trojan horse
  • I’m what happens when staff are trained to spot suspicious links and scams.
    User awareness training
  • I connect your devices wirelessly, letting laptops and phones reach the network.
    Wireless access point
  • I’m a strong password method that uses two or more verification steps.
    Multi-factor authentication (MFA)
  • I’m a policy that ensures everyone knows their responsibilities when using company systems.
    Acceptable Use Policy (AUP)
  • I’m a small program that checks your system for weak points before hackers do.
    Vulnerability scanner
  • I flood servers with so much traffic that real users can’t get through.
    Denial of Service (DoS) attack
  • I’m the brain of the computer — I fetch, decode, and execute instructions all day long.
    CPU (Central Processing Unit)
  • I temporarily hold the data your system is using right now — lose power, and I forget everything.
    RAM (Random Access Memory)
  • I monitor incoming and outgoing network traffic to block suspicious activity.
    Firewall
  • I’m a weakness in your system that attackers love to exploit.
    Vulnerability