1.4.Network Security Flashcards

1
Q

Malware

A

Malicious software that causes damage when it runs (e.g. editing or deleting files).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A

Tricking users into giving personal info via fake emails or messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pharming

A

Redirects you to a fake website to collect personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social Engineering

A

Manipulating people into giving personal or sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data interception and theft

A

Data sent to another device is intercepted by an unauthorised user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SQL Injection

A

Inserting malicious SQL into databases to access or steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Poor Network Policy

A

Lack of security rules lets unauthorised users access data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Weak Passwords

A

Passwords that are easy to guess or lack complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Out of date software

A

Software that hasn’t been updated and is vulnerable to threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ransomware

A

Blocks access to files until a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Passive Attack

A

Monitoring network traffic to steal data without altering it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Active Attack

A

Attacking a network with malware or planned harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Insider Attack

A

An insider misuses their access to steal or expose data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Brute Force Attack

A

Using software to try many password combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Denial of Service (DoS)

A

Flooding a network with traffic to stop it working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Penetration Testing

A

Testing network security by simulating attacks.

17
Q

Physical Security

A

Using locks, keys, and ID cards to protect systems.

18
Q

Network Policies

A

Rules to reduce chances of employee data leaks.

19
Q

Anti-malware Software

A

Detects and removes malware.

20
Q

Firewalls

A

Monitor traffic to block unauthorised access.

21
Q

User Access Levels

A

Different access rights to protect sensitive info.

22
Q

Passwords

A

Used to verify identity and prevent unauthorised access.

23
Q

Encryption

A

Scrambles data to prevent unauthorised users from reading it.