NETWORK SECURITY Flashcards

1
Q

Describe Viruses, worms, and Trojan horses

A

These contain malicious software or code running on a user device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe Spyware and adware

A

These are types of software which are installed on a user’s device. The software then secretly collects information about the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe Zero-day attacks

A

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Threat actor attacks

A

A malicious person attacks user devices or network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe Denial of service attacks

A

These attacks slow or crash applications and processes on a network device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Data interception and theft

A

This attack captures private information from an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe Identity theft

A

This attack steals the login credentials of a user in order to access private data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe possilble internal security threats

A

This can be attributed to lost or stolen devices, accidental misuse by employees, and in the business environment, even malicious employees. With the evolving BYOD strategies, corporate data is much more vulnerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe Antivirus and antispyware

A

These applications help to protect end devices from becoming infected with malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe Firewall filtering

A

Firewall filtering blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe Dedicated firewall systems -

A

These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe Access control lists (ACL)

A

These further filter access and traffic forwarding based on IP addresses and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Intrusion prevention systems (IPS)

A

These identify fast-spreading threats, such as zero-day or zero-hour attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Virtual private networks (VPN)

A

These provide secure access into an organization for remote workers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What considerations must be made before selecting Network security requirements?

A
  • The environment
  • The various applications, and computing requirements.
  • Quality of service that users expect of each technology.
  • Must be adaptable to the growing and changing trends of the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly