1.4.1 & 1.4.2 - Threats and Preventing Vulnerabilities Flashcards

1
Q

Malware is a piece of software created to…

A

Cause harm or damage to a computer system. Examples of malware include Spyware, Ransomware, Trojans and Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social engineering is…

A

Using social methods (emails and social media) to reveal personal or company information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A brute force attack is…

A

A trail and error process that uses many passwords to try to guess a password to a computer system. Usually done with a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A denial of service attack is…

A

Preventing legitimate users from accessing a service. This is done by a computer sending thousands of requests so that every data packet has to be processed and the server eventually crashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data interception is…

A

Theft by copying data sent over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An SQL injection is…

A

A command that reveals database details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Penetration testing is…

A

Testing a systems vulnerabilities and defences in a secure, planned way often using “ethical hackers”
They then give advice on how to improve the secuirt to make it harder for real attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does anti-malware software work to protect the computer

A
  • It has a database of malware defenitions
  • Every file that is downloaded (or incoming email) is checked to see if anything matches the database
  • If there is a match, the malware is quarantined and removed
  • It also does full system scans to see if there are any existing infected files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A firewall is …

A

Used to prevent hackers from gaining unauthorised access into a system, by monitoring incoming and outgoing traffic. It only allows traffic from trusted sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are user access levels and their benefits

A
  • Only users with certain credentials can access certain things on the network (based on their needs for work)
  • This means if one account is compromised, the data a hacker can access is limited reducing the effect of brute froce attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A password is…

A

Used to authenticate the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is encryption

A

Scrambling data using cipher software and has to be read using a key so only the intended recipient and sender can read it
This means if the data is intercepted, an unauthorised user can read the data, but not understand it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Physical security is…

A

The use of locking doors, CCTV, biometrics etc. to deter thieves from taking hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly