1.4 Network Security Flashcards

1
Q

What is the purpose of network security?

A

The purpose of network security is to protect a network and its data from threats such as unauthorized access, hacking, and data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is malware?

A

Malware is malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name three common types of malware.

A

Three common types of malware are viruses, worms, and Trojan horses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a virus?

A

A virus is a type of malware that attaches itself to legitimate programs or files, spreading to other systems when the infected file is executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a worm?

A

A worm is a type of malware that replicates itself to spread to other computers without needing to attach to a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Trojan horse?

A

A Trojan horse is a type of malware disguised as a legitimate program, which, once executed, allows attackers to gain unauthorized access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does a firewall contribute to network security?

A

A firewall monitors and controls incoming and outgoing network traffic, allowing only authorized traffic based on security rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is encryption in the context of network security?

A

Encryption is the process of converting data into a code to prevent unauthorized access during transmission over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Denial of Service (DoS) attack?

A

A Denial of Service (DoS) attack overwhelms a network or website with excessive traffic, causing it to crash and become unavailable to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between a DoS attack and a Distributed Denial of Service (DDoS) attack?

A

A DDoS attack involves multiple computers working together to launch a DoS attack, making it harder to stop compared to a single-source DoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is phishing?

A

Phishing is a social engineering attack where attackers attempt to deceive individuals into providing sensitive information, such as passwords or credit card details, by impersonating a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can phishing be prevented?

A

Phishing can be prevented by being cautious of unsolicited emails or messages, not clicking on suspicious links, and using spam filters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is two-factor authentication (2FA)?

A

Two-factor authentication (2FA) is a security process that requires users to provide two forms of identification before gaining access to an account or system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an Intrusion Detection System (IDS)?

A

An Intrusion Detection System (IDS) monitors network traffic for signs of suspicious activity or potential threats and alerts administrators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a VPN (Virtual Private Network), and how does it enhance network security?

A

A VPN encrypts internet traffic and routes it through a secure server, making it difficult for hackers to intercept data and ensuring privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the role of antivirus software in network security?

A

Antivirus software detects, removes, and protects against malicious software (malware) such as viruses, worms, and trojans.

17
Q

What is a brute-force attack?

A

A brute-force attack is a method of trying many passwords or encryption keys to gain unauthorized access to a system.

18
Q

What is a botnet?

A

A botnet is a network of compromised computers controlled by an attacker, often used to launch attacks like DDoS.

19
Q

How does multi-factor authentication (MFA) differ from two-factor authentication (2FA)?

A

MFA requires two or more types of verification factors (such as passwords, biometrics, and tokens), while 2FA only requires two.

20
Q

What is a vulnerability scan?

A

A vulnerability scan is an automated tool that checks a system or network for known security weaknesses or vulnerabilities.

21
Q

What are some best practices for improving network security?

A

Best practices include using strong, unique passwords, enabling firewalls, encrypting sensitive data, regularly updating software, and using antivirus software.