1.4 Network Security Flashcards

1
Q

What are the 4 types of malware

A
  • Virus
  • Ransom-ware
  • Trojan horse
  • worms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does malware mean

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 types of attacks

A
  • Malware
  • data interception ( man in the middle )
  • social engineering
  • spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is social engineering

A

Manipulating people into giving up personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spyware

A

Spying on people with their own computer (like impero)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phishing

A

Fake e- mails to get you to give up personal info / passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is shoulder surfing

A

Looking over peoples shoulders while they type their passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DDoS / DoS attack

A

Overloads a server with traffic causing it to slow down or crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the dissidence between DDoS and a DoS attack

A

A DoS attack is from 1 computer whereas a DDoS uses a bot net

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a bot net

A

Series of injected computers that send traffic to a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a virus work

A

Attaches to a host file, spreading damaging and stealing into from other files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a Trojan horse work

A

The file disguises itself as something desirable although when it is opened it damages and steals files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do worms work

A

File duplicates and takes up space and slows down a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does ransom ware work

A

Holds files hostage until ransom is payed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does an SQL injection work

A

SQL code is typed into a search - bar to access a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does key logging work

A

Tracks key presses on a keyboard

17
Q

What is anti - malware software

A

Software that identifies and sends malware and sends it to an anti-malware company who adds signature to the file and adds the signature to the black-list

18
Q

How does a firewall work?

A

A set of rules that determine what can access and enter your computer / router

19
Q

What is physical protection

A

When servers and computers use protected by physical methods( e.g. Security cameras )

20
Q

How does penetration testing work

A

A white hat hacker tests network security to test for weak points and reports problems to hirer

21
Q

How does encryption work?

A

Messages/ files are scrambled so they can’t be read by anyone without A decryption key

22
Q

How do user access level work?

A

Allows people with different permissions to access different setting, files, data -basses

23
Q

How does password secrets work

A

Including symbols, punctuation, capital letters, minimum length - more difficult to guess

24
Q

What are the 3 types of hackers

A
  • White hat(private,legal)
  • grey hat(moral, illegal)
  • black hat (immoral, illegal)