1.4 Network Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are networks ?

A

A group of interconnected computers/devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the forms of network attacks ?

A
  • Active
  • Eavesdropping(Passive)
  • External
  • Internal
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Active network attack ?

A

attempts to modify or delete data, or to prevent a network from operating correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Eavesdropping (Passive) network attack ?

A

hacker monitors a network in order to gain information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an External network attack ?

A

someone outside of an organisation attempts to hack its network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Internal network attack ?

A

someone within an organisation attempts to hack its network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Malware ?

A

Malware is malicious software that is designed to hack a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a virus ?

A
  • Programs embedded within other files
  • replicate themselves and become part of other programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are worms ?

A
  • they are not hidden within other files
  • often spread through emails.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Trojans ?

A
  • Programs which act to be legitimate but are malware
  • cannot spread by themselves
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is spyware ?

A
  • Programs that monitor user activities
  • send the information back to a hacker.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ransomware ?

A
  • Programs that attempt to blackmail a user into making a payment to a hacker
  • encrypt documents and won’t decrypt them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is phishing ?

A

Emails that try to trick users into giving away personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a brute force attack ?

A

a program is used to find a password by trying all possible combinations of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Denial of Service (DOS) attack ?

A

Where a computer is used to prevent a server from performing its tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a data interception and theft attack ?

A
  • Where data is intercepted during transmission
    -using software called a packet sniffer
17
Q

What is a SQL injection attack ?

A

Where SQL code is entered as a data input

18
Q

What is poor network policy ?

A

Where a network does not have security rules in place for users to follow.

19
Q

What are features that poor network policies tend no to have ?

A
  • Levels of access
  • stopping the connection of external devices
  • regulation regarding secure passwords
  • Restriction on websites
  • Preventing wireless connection/remote access
  • Formal backup procedure
  • Maintenance program
20
Q

What are the methods to keep a network safe ?

A
  • Penetration testing
  • network forensics
  • User access levels
  • secure passwords
  • encryption
  • anti-malware software
  • firewalls
21
Q

What is penetration testing ?

A

probing the network for potential weaknesses and attempt to exploit them

22
Q

What is network forensics ?

A
  • monitoring the traffic on a network
    -At regular intervals transmitted data packets are copied
  • stored for later analysis
23
Q

What are user access levels ?

A

Determine the facilities a user has access to

24
Q

What is a secure password ?

A
  • one that is not easy to guess
  • that requires at least eight characters
  • at least one uppercase letter
  • one number
  • one special character
25
Q

What is encryption ?

A
  • process of disguising data so that it cannot be understood
26
Q

What is anti malware software ?

A

scanning through all the files on a computer and checking them against a list of known malware

27
Q

What are the three purposes of anti malware ?

A
  • to detect malware that has been installed
  • to prevent malware from being installed
  • to remove malware from the system
28
Q

What are firewalls ?

A
  • tool that monitors traffic going into and out of a computer or network
  • allows the traffic to pass through or blocks it.
29
Q

Why can anti malware be ineffective ?

A

If not updated as it’s only reactive to what it knows.

30
Q

Can firewalls be hardware-based or software based ?

A

YES