Network security Flashcards

1
Q

What is a brute force attack?

A

An active attack used to gain information by cracking passwords through trial and error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Denial Of Service Attack?

A

Flooding a network with traffic to make it slow and inaccessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is spyware?

A

Hackers secretly monitor the user actions (e.g. key presses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is malware?

A

Malicious software installed on someones device with out their knowledge/ consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a trojan/ how does a trojan work?

A

Malware disguised as legitimate software, users install them not realising it’s malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is worm/ how does a worm work?

A

Similar to viruses but self replicate so they can spread quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a virus/ how does a virus work?

A

Viruses attach to certain files by copying themselves which users spread by copying these files and activate them by opening them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is phishing?

A

When someone tries to gain sensitive data through emails or messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are people a weak point in system security?

A

Leaving the computer on
Weak password
Using public/insecure wifi
Not encrypting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a SQL injection?

A

SQL is a programming language used to manipulate databases
When malicious SQL query is entered into a data input box on a website it can trick the website into giving unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering?

A

It’s tricking someone into revealing their personal data by posing as a trusted sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is data interception?

A

When packets of data are intercepted by a third party whilst being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are penetration tests and why are they used?

A

Ethical hacking to find weak points in a system and fix them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is firewall and why is it used?

A

Manages incoming and outgoing network traffic, and decides wether to block or allow it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is anti malware software and why is it used?

A

It detects malware and deletes it to reduce/ prevent its effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are passwords?

A

A way of protecting personal information

14
Q

What is user access levels?

A

Manages who has access to data and how much control they have over it

15
Q

What is encryption?

A

A way of scrambling data in an unreadable format so that attackers can’t understand it if it’s intercepted

16
Q

What are some examples of physical security?

A

Using a lock to prevent people from accessing the whole computer system
CTTV cameras as a deterrent and provides evidence/ proof