Hardware and Software Security Flashcards

1
Q

Physical Security Methods refer to ……

A

Methods for restricting access so malicious users cannot gain access to IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some methods for Physical Security Methods?

A
.Site Security Locks
.Card Entry
.Biometrics
.CCTV
.Security Staff
.Alarms
.Protected Cabling
.Cabinets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are Backup Procredures useful?

A

Yes.

Bakups allow for easier data recovery from any damage or accidental loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define an “Anti-virus”

A

Anti-virus is a utility program that is used to prevent malicious software from infecting your computer, or detect and remove malicious software that has already infected you computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An Anti-virus may use Signiture Detection.

Define “Signiture Detection”

A

Signiture detection identifies malware using a apttern (the signiture) for the malware code that is compared to programs on your hard disk to identify the viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An Anti-Virus may use Heuristic Detection.

Define “Heuristic Detection”

A

Heuristic Detection monitors the behaviour of programs to identify any suspicious behaviour and flags it as a possible virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Once detected, what can happen to a virus?

A

The virus can be:

.Cleaned
.Quarentined
.Deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define a “Firewall”

A

Firewalls are either a hardware device or a utility program that monitors incoming and outgoing network traffic, and blocks any traffic that it deems suspicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A Firewall may use Packet Filtering.

Define “Packet Filtering”

A

Packer Filtering inspects each packet of data and compares it to pre-defined security rules. If the packet is flagged by the rules, then it is prevented from passing through the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

At what layer does a firewall have to be to control the input and output of packets to an application?

A

At Application Layer,

Hence the name Application Level Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What rules define what packets should be allowed by the firewall?

A

Inbound and Outbound rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can we do with the rules?

A

.Accept - Let in
.Reject - Send an message
.Drop - Reject with no message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define “Network Address translation”

A

Network Address Translation is used to hide addresses of our device from the outside world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly