Unit 5 and Unit 6 Review Materials with Answers

Unit 5 and Unit 6 Review Materials with Answers - Unit 5...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Unit 5 and Unit 6 Review Materials with Answers Note: The questions on the exam will be based on variations of the following pool of questions and exercises in Unit 5 and Unit 6. 1. Computer System Attacks a. Describe each of the following computer system attacks i. file virus A virus hidden in an application program. When the program is executed, the virus replicates itself and can perform malicious activities now or later. ii. macro virus A virus hidden in a document type that supports macros or scripts, such as Word or Excel. Opening the document can cause the macro to execute immediately. iii. boot sector virus A virus in the boot sector of the disk or floppy. It spreads every time the infected disk is in the computer when it boots. iv. Trojan horse A computer program that appears to perform one function while actually performing another. v. worm A program that gains access to a computer, typically through a network security flaw, or another opening caused by careless system administration. The worm then attempts to access additional computer systems. It may have a payload or simply clog up the computer. b. Name two software programs that protect against the attacks listed in part a . Norton Anti-Virus and Macaffee VirusScan, as examples. 1. Data Backups a. Describe full, incremental, and differential backups. A full backup records all files in the backup set. An incremental backup records all files modified since the last backup (whether full, differential, or incremental). A differential backup records all files modified since the last full backup (even if later differential or incremental backups have occurred.) b. Name two benefits of performing backups. 1. You can restore your files in case your hard disk fails. 2. You can retrieve files from the backup that were accidentally deleted from your hard disk.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
c. In the table below, fill in a backup schedule for a one-week period for a typical desktop machine. Strategy Schedule Full M: Full backup A (letter refers to a tape ID) T: W: H: F: (Rationale: full backups are time consuming, so you usually do them only infrequently.) Incremental + Full M: full backup A T: incremental B W: incremental C H: incremental D F: incremental E (Rationale: incrementals are the fastest ones to do so you can do them more often, but you must keep all of them since the last full or diff. Backup.) Differential + Full M: full backup A T: W: differential B H: F: differential B (Rationale: differentials are larger and slower to do, but you only have to keep the last one since the full backup.) 1. Data Integrity a. In the context of Java applets, what is a sandbox, and how does it protect computer information? A sandbox is a secure location to run Java applets and ActiveX controls.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/28/2010 for the course SPEC 2 taught by Professor 221 during the Spring '10 term at APIIT.

Page1 / 6

Unit 5 and Unit 6 Review Materials with Answers - Unit 5...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online