1.4 - Network Security Flashcards

1
Q

What is SQL injection?

A

Controlling a database via user input

A SQL injection is when a malicious SQL query (command) is entered into a data input box on a website. If the website is insecure then the SQL query can trick the website into giving unauthorised access to the website’s database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

Tricking humans into revealing personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a brute-force attack?

A

Is an attack in which every possible password combination is tested in order from start to finish.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you lessen the risk of a brute-force attack working?

A

Long passwords and a limit on attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Denial of Service (DoS) attack?

A

A computer repeatedly sending requests to a server causing the system to slow or crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Distributed Denial of Service (DDoS) attack?

A

A coordinated attack using a botnet of infected systems to overload a server with requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is malware?

A

A harmful program seeking to damage or gain unauthorised access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a virus?

A

Self-replicating malware that attaches itself to infected files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a worm?

A

Self-replicating malware that finds weaknesses in software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a trojan?

A

A harmful program that looks like legitimate software so users are tricked into installing it to get backdoor access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does spyware do?

A

Secretly records the activities of a user to look for usernames, passwords and credit card information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a keylogger do?

A

Secretly records the key presses of a user to record usernames, passwords and credit card information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does ransomware do?

A

Locks files using encryption so a user can’t access them and demands money from the victim to decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is data interception?

A

Data packets are intercepted by a third party and copied to a different location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is penetration testing?

A

Simulating an attack to find weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does a firewall do?

A

Checks packets and blocks packets if they don’t meet a rule

17
Q

What is physical security?

A

The protection of data from physical actions.

e.g. CCTV, locks, security staff, etc.

18
Q

What is anti-malware?

A

A software program which scans for known malware and removes it

19
Q

What are user access levels?

A

Permissions an individual has when dealing with a computer system or network e.g. Who can read and/or write to what file

20
Q

What is encryption?

A

Converting plain text into cypher text using an encryption key so that it cannot be easily understood if stolen