LO3.2 Flashcards

1
Q

What is vulnerability testing?

A

Identifying a list of vulnerabilities that can be prioritised in order of severity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How may you identify vulnerabilities?

A

Penetration testing
Fuzzing
Security functionality
Sandboxing
Honeypotting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is penetration testing?

A

An intentionally simulated attack performed by a professionall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is fuzzing?

A

Inputting huge amounts of random data in an attempt to crash the system to identify coding errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is security functionality?

A

It identifies flaws in security mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is sandboxing?

A

An environment that isolates untested code changes to ensure issues aren’t transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is honeypotting?

A

Setting up a computer system as a decoy to detect, deflect and counteract any unauthorised use of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between anomaly and signature based?

A

Anomaly based identifies if activity is expected or not whereas signatured based monitors specific patterns for activity that aligns with sequences used by malware. This means that signatured based requires regular updates to upkeep with the times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an IDS (intrusion detection system)?

A

Device or software used to monitor systems for malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three types of IDS (intrusion detection system)?

A

NIDS (Network Intrusion Detection System)
HIDS (Host Intrusion Detection System)
DIDS (Distributed Intrusion Detection System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a NIDS (Network Intrusion Detection System) do?

A

Monitors all inbound and outbound network activity to identify any suspicious patterns that indicate a cyber attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a HIDS (Host Intrusion Detection System) do?

A

Monitors inbound and outbound packets of a device for any suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a DIDS (Distributed Intrusion Detection System) do?

A

Multiple IDS (intrusion detection systems) on a large network communicating with each other that provide a broad overview of network activity and facilitates fast analysis of any issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an IPS (Intrusion Prevention System)?

A

Proactive detection and prevention against unwanted intruders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s an example of an IPS (Intrusion Prevention System)?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly