11. Network Security Fundamentals Flashcards
1
Q
List out the 4 types of threats
A
- Information Theft
- Data Loss and Manipulation
- Identity Theft
- Disruption of Service
2
Q
What will result in when network are being attacked?
A
- Loss of Time & Money due to damange
- Theft important information or assets
3
Q
How does attacker access network? ( )
A
- Software Vulnerabilities ( Bug )
- Hardware Attacks
- Guessing someone Username and Password
- Modifying software or exploiting vulnerabilities
4
Q
What is vulnerability ?
A
- Degree of weakness in a network or a device
5
Q
What device that may have some vulnerability? ( 5 )
A
- Routers
- Switches
- Desktops
- Servers
- Security Devices
6
Q
List out the 3 primary vulnerabilities or weakness
A
- Technological Vulnerabilities
- Configuration Vulnerabilities
- Security Policy Vulnerabilities
7
Q
What does Technological Vulnerabilities might include ( 3 )
A
- TCP/IP Protocol Weakness
- Operating System Weakness
- Network Equipment Weakness
8
Q
What does Configuration Vulnerabilities might include?
A
- Unsecured user accounts
- System accounts with easily guessed passwords
- Misconfigured internet services
- Unsecure default settings
- Misconfigured netwoek equipment
9
Q
What does Security Policy Vulnerabilities might include?
A
- Lack of a written security policy, politics
- Lack of authentication continuity
- Logical access controls not applied
- Software and Hardware Installation
- Changes not following policy
- Nonexistent disaster recovery plan
10
Q
List out the 4 classes of physical threads
A
- Hardware Threats
- Environment Threads
- Electrical Threats
- Maintenance Threats
11
Q
What does Hardware Threads includes?
A
- Physical Damage to
- Servers
- Routers
- Switches
- Cabling Plant
- Workstations
12
Q
What does Environment Threats includes?
A
- Extreme Temperature
- Extreme Humidity
13
Q
What does Electrical Threats include?
A
- Voltage Spikes
- Insufficient Supply Voltage
- Unconditioned Power
- Total power loss
14
Q
What does Maintenance Threats includes?
A
- Poor handling of key electrical components
- Lack of critical spare parts
- Poor cabling
- Poor labeling
15
Q
What is the short form for Malicious Software?
A
- Malware