1.4 NETWORK SECURITY AND SOFTWARE Flashcards

1
Q

What is a network attack?
Hint words: gain, access, steal, modify, delete

A

An attempt to gain access to steal, modify, or delete data from a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an active attack?
Hint: attempts, modify, delete, data, correctly

A

Where a hacker attempts to modify or delete data, or to prevent a network from operating correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an example of an active attack?

A

Denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Eavesdropping (passive) attack?
Hint: monitors

A

Where the hacker monitors a network in order to gain information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an example of passive/eavesdropping attack?

A

Wiretapping. Where communications are monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an external attack?
Hint: outside, organisation, its

A

Where someone from the outside of an organisation attempts to hack its network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an internal attack?
Hint: within, hack

A

Where someone from within an organisation attempts to hack a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a malware?
Hint words: malicious, designed, system

A

A malicious software that is designed to hack a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a virus?
Hint: hidden, replicate, damage, deleting, modifying, data.

A

Programs hidden within other files. They replicate themselves and become a part of other programs. They cause damage by deleting or modifying data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are worms?
Hint words: aren’t hidden, spread, emails

A

Programs like viruses except they aren’t hidden in programs. They are instead spread through emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are trojans?
Hint: pretend, legitimate , deceive, installing

A

Programs which pretend to be legitimate but in reality are malware. Cannot spread by themselves. Deceive the user into installing the program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is spyware?
Hint words: programs, monitor, activities, send info back

A

Programs that monitor user activities. Such as websites visited, usernames, passwords and send info back to hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a malware threat?
Hint words: attempt, user, payment, hacker

A

Programs that attempt the user into making payment for the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is phishing?

A

Emails that try to trick the users into giving away personal details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is brute force?

A

Where a program is used to find a password by trying all possible combinations and passwords until the correct one is obtained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly