Network Security Flashcards

1
Q

Computer Surveillance

A

When Someone Monitors What Others do on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

User Access Levels

A

Used to Control What Parts of a Network can be Accessed by Particular Individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anti-Malware Software

A

To Find and Stop Malware From Damaging a Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passwords

A

Used to Prevent the Unauthorised Access of Important or Sensitive Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SQL Injection

A

Structured Query Language is a Database Managing Language and can be Used to Access Information in a Database from the Input Box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

E-mails claiming to be a Legitimate Site While Sending the User to a Different Site (Normally a Malicious One)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojans

A

Malware Disguised as Legitimate Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worms

A

A Self Replicating Virus (Doesn’t Need a File)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Viruses

A

Infects a File and Replicates itself Inside of the File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial-of-Service Attack (DoS)

A

Flooding a Network With Requests Which Slows the Network Down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Brute Force Attack

A

Attacking a Network Through Trial and Error to Guess the Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Insider Attack

A

Someone Within an Organisation Who Steals Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Active Attack

A

When Someone Attacks a Network With Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Passive Attack

A

The Interception of Data Being Transferred to be Read or Used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Scareware

A

Scares the User into Following Malicious Links or Paying for a Non-Existent Problem to be Fixed

17
Q

Social Engineering

A

Influencing People into Giving Hackers Access to Information

18
Q

Ransomware

A

Used to Lock and Encrypt Files and Demands a Large Sum of Money to Remove to Encryption

19
Q

Spyware

A

Used to Secretly Monitor a User’s Actions

20
Q

Rootkits

A

Used to Alter Permissions Which Gives a Hacker Administrative Access

21
Q

Whitelist

A

Only People on the List can Access

22
Q

Blacklist

A

Only People Not on the List Can Access

23
Q

Encryption

A

Data Gets Translated into a Code