You are on page 1of 2

it has been developed by ISO in the year 1984.

OSI Reference Model

It is a set of standards that are widely used as a basis for communication.


protocol

These layers work together to transmit the data from one person to another world
wide
OSI layer

A type of malware that automatically sends advertisements to the users.


Adware

It is an act that exploits a vulnerability.


attack

these are what make networks prone to information loss and downtime
Vulnerabilities

It is anything that can disrupt the operation, functioning, integrity, or


availability of a network or system
threat

This layer is also called human-computer interaction layer.


Application Layer

Type of malware that may contain an attachment to an email that loads malware onto
your computer system.
Phishing

It provides data routing paths where data will take for network communication.
Network Layer

any program design to damage specific file or computer system.


malware

It pretends to be a legitimate programs in order to gain access to a system.


trojan horse

Which of the following are not part of OSI Layer?


transfer layer

This layer involves devices such as router, UTP Cables and other networking devices
to transfer data.
phiysical layer

Two different devices can communicate with each other regardless of the
manufacturer as long as they have the same protocol.
true

SQL stands for?


Structured Query Language

Worms can be classified as a type of computer virus that needs a third party or a
user to replicate and spread through the system.
false

It may contain phishing scams and malware.


spam
What are the signs and symptoms that your device/s are getting infected by any
malware. (Choose all that applies)

Select one or more:


a. Increased CPU usage
b. Appearance of strange desktop icons
c. Software freezes or crashes
d. Slower computer performance

Brute force attack are often successful because most of the users uses different
ordinary words as their passwords.
false

You might also like