attacks and protection Flashcards

1
Q

brute force attack?

A

cracking passwords through trial and error using automated software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

prevent brute force attack?

A

strong passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

denial of service attack (DoS)?

A

floods a network with requests to slow it down or make it go offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

phishing?

A

emails/texts pretending to be something they aren’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

prevent phishing?

A

poor spelling
forged link
etc etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

man in the middle?

A

hacker intercepts communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is malware?

A

malicious software installed on a device without knowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does malware do?

A

delete/modify files
locks files and holds ransom
monitors users actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how does malware access devices?

A

viruses
worms
trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

virus?

A

attach to files and infecting them
user copys infected file causing spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

worms?

A

self replicate infected files by themselves
spreads quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

trojan?

A

malware disguised as software, user installs not knowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

prevention examples?

A

encryption
penetration testing
firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

encryption?

A

encrypts data so only those with the encryption key can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

firewall?

A

checks oackets of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

penetration testing?

A

hacking your own system to find weak points