Glossary Terms - Determine & Action Network Problems Flashcards

1
Q

Virus

A

Inserts and copies themselves into programs. Can corrupt or destroy data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worms

A

Like viruses but spread by themselves. They are capable of overloading networks since they spread quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojans

A

Designed as desirable software and can perform the tasks of a virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware

A

Collects data about the activities of the computer and sends it back to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Adware

A

Displays unwanted advertisements to generate income for the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

Where a website, email or software looks trustworthy but isn’t. Personal data such as credentials are collected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Engineering

A

Where people are exploited as weak-points by manipulating them, and influencing them to do something.
This is done by using information they already know about them to guess their password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Brute-Force Attacks

A

All possible combinations are systematically tried in the aim of getting the correct username & password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Interception

A

Data is captured when travelling through radio waves through packet sniffers or a website and credentials can be compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DoS

A

Floods a network with useless requests and causes the network to be deliberately overloaded and becomes unresponsive/crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SQL Injection

A

Where malicious SQL commands are inserted into the fields of websites to get an output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Email Security

A

The way in which the contents of emails are kept safe as they are stored and sent over networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intrusion Prevention Systems

A

Software and systems which alert the user to any packets of data that aren’t a legitimate part of the network traffic to warn them of possible threats to data and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Segmentation

A

How a network is broken up into multiple parts or segments. This makes use of a decentralised/blended type of management, where all workstations on the network have equal access to data. However, the network admins have the most control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DMZ

A

Demilitarised Zone.

A type of server which improves the security and performance to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zero-Day Attack

A

An attack by a virus that isn’t yet known.