1.4 Network Security Flashcards

1
Q

What is an active attack

A

When someone attacks a network with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a passive attack

A

The monitoring and interception of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a brute force attack

A

Passwords are cracked through trial and error
Using software to try every combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to defend a brute force attack

A

Lock after a certain amount of guesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DOS attack

A

Denial of Service
The users cannot access a certain part of the network by flooding the network with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Malicious software that exploits a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can malware enter a computer

A

Virus
Worms
Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are viruses

A

Malware that binds to a certain file and goes onto computer when opened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are worms

A

Self-replicating malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Trojans

A

Malware disguised as legitimate software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is usually the weak point in secure systems and give an example how

A

People, shoulder surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is social engineering

A

Gaining access to a network or information by manipulating people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is phishing

A

When people are sent emails or messages claiming to be legitamate and it’s aim is to steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Apart from phishing give an example of social engineering

A

Scam calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an insider attack

A

Someone who has access to the network exploits it to steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does SQL mean and what is it

A

Structured Query Language
It is a coding language used to access information in databases

17
Q

What is an SQL interjection

A

Using malicious SQL code in a websites input box to reveal sensitive information

18
Q

7 ways how to prevent malware attacks

A

Penetration Testing
Physical Secuirty
Passwords
User Access Levels
Anti-Malware
Firewall
Encryption

19
Q

How does penetration testing keep a network secure

A

Organisations employ white hat hackers to do an attack on the network and simulate where the weaknesses are

20
Q

How does physical security keep a network secure

A

The physical parts of the network are protected through locks and surveillance

21
Q

How do passwords keep a network secure

A

Prevent unauthorised users accessing the network

22
Q

How do user access levels keep a network secure

A

Which part of the network can be accessed by which users
Limit the number of people with access to important data

23
Q

How does anti-malware keep a network secure

A

Stops malware before it can damage a network
Firewalls block unauthorized access

24
Q

How does encryption

A

Data is transferred into a code only a key can open
Data can be sent over a network securely