LO3 Flashcards

1
Q

How can you mitigate risks?

A

Testing systems and networks for vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are assets?

A

Hardware, software, communication equipment, information and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a ‘back door’

A

Method by which a programmer or network manager bypasses the normal security procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is cost/benefit

A

The cost of implementing security against the benefits that it would bring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can you protect vulnerabilities

A

Put measures in place to protect assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of hardware assets

A

Servers, printers, scanners and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are examples of software assets

A

Word processors, spreadsheets, CRM, financial packages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is risk management

A

Taking steps to monitor the system or network to identify its weaknesses or vulnerabilities and put in place sufficient and appropriate measures to reduce or eliminate the risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a patch deployment

A

Software issues are identified and reported. Hot fixes are designed to remove the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is manual remediation

A

Instead of using automated tools, technician or network manager will take steps to remove or reduce the vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are automated tools

A

Tools that identify and repair vulnerabilities without the intervention of the technician or network manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is vulnerability
testing

A

Identification of a list of vulnerabilities that can be prioritised in order of severity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is penetration testing

A

A software tool that tests a compute system/network to identify vulnerabilities that could be exploited by a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is fuzzing

A

Fuzzing is used to identify coding errors and security loopholes in software, operating systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does fuzzing involve

A

Inputting huge amounts of random data in an attempt to make the system crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is security functionality

A

Used to identify flaws in security mechanisms that are supposed to protect data and information

17
Q

What is sandboxing

A

Test environment that isolates untested code changes to ensure any issues are not transmitted onto the main areas of the system

18
Q

What is an intrusion detection system (IDS)

A

Software that monitors computer systems and networks for unexpected malicious activities

19
Q

What is a network intrusion detection system (NIDS)

A

Monitors all inbound and outbound network activity to identify any suspicious patterns that indicate a cyber attack

20
Q

What is risk analysis

A

Determining the likelihood of a risk occurring and its impact on the company

21
Q

What is a monitoring system

A

A system that alerts/reports if it detects specific type of activity.

22
Q

What is a control system

A

A system that would be used if there was a need for certain access and/or denial of traffic to your network.

23
Q

What is a host intrusion detection system

A

detects unusual, unauthorised or illegal activities on a specific device.

24
Q

What is a distributed intrusion detection system

A

Consists of multiple IDs (intrusion detection systems) over a large network that communicate with each other or a central server

25
Q

What is a honeypot

A

A computer system set up as a decoy to detect, deflect and even counteract unauthorised use of the system

26
Q

What is an intrusion prevention system

A

Proactive detection and prevention against unwanted intruders

27
Q

What are biometrics

A

The identification of a user based on a physical characteristic, such as a fingerprint, iris, face or voice recognition

28
Q

What are RFIDs

A

uses electromagnetic fields to attach tags to physical objects. ID cards. It allows authorised people to access certain areas

29
Q

What is a firewall

A

Controls and monitors incoming and outgoing traffic in a network

30
Q

What is anti malware

A

Locates and destroys or quarantines malware

31
Q

What is asymmetric encryption

A

Uses two keys to encrypt plaintext. Anything encrypted using a public key can be decrypted using a private key

32
Q

What is symmetric encryption

A

Only uses one key shared among the people who need to access the data

33
Q
A