A+ RATED | 2026/27
Ransomware - Correct Answer A form of malicious software that infects your computer and
asks for money
Spyware - Correct Answer A special class of adware that collects data about the user and
transmit it over the internet without the users knowledge or permission
Adware - Correct Answer Software that although purporting to serve some useful function and
often fulfilling that function also allows internet advertisers to display advertisements without
the consent of the computer user
Worm - Correct Answer Spread itself not only from file to file but also from computer to
computer without user intervention
Virus - Correct Answer Software written with malicious intent to cause annoyance of damage
Drive-by hacking is a computer attack where an attacker accesses a wireless computer network,
intercepts data, uses network services, and/or sends attack instructions without entering the
office or organization that owns the network - Correct Answer A computer attack where an
attacker accesses a wireless computer network intercepts data uses network services and or
sends attack instruction without entering the office or organization that owns the networks
Hacker - Correct Answer Experts in technology who use their knowledge to break into
computer and computer networks either for profit or simply for the challenge
Information security - Correct Answer A broad term encompassing the protection of
information from accidental or intentional misuse by persons inside or outside an organization
, Downtime - Correct Answer Refers to a period of time when a system is unavailable
Agile MIS infrastructure - Correct Answer Includes the hardware software and
telecommunications equipment that when combined provide the underlining foundation to
support the organization goals
Sustainable MIS infrastructure - Correct Answer Identifies ways that a company can grow in
terms of computing resources while simultaneously becoming less dependent on hardware and
energy consumption
Backup - Correct Answer An exact copy of a system's information
Recovery - Correct Answer The ability to get a system up and running in the event of a system
crash or failure and includes restoring the information backup
Fault tolerance - Correct Answer The ability for a system to respond to unexpected failures or
system crashes as the backup system immediately and automatically takes over with no loss of
service
Failover - Correct Answer Occurs when redundant storage server offers an exact replica of the
real time data and if the primary server crashes the users are automatically directed to the
secondary server or backup server
Failback - Correct Answer Occurs when the primary machine recovers and resumes operations
taking over from the secondary server
Disaster recovery plan - Correct Answer Detailed process for recovering information or a
system in the event of a catastrophic disaster