Network Security Flashcards

1
Q

What is malware?

A

Malware is MALicious software installed onto devices without the user’s knowledge or consent with the intent of causing damage to the device or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three ways malware can access a network?

A
  • Viruses
  • Worms
  • Trojans
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an insider attack and how can it be prevented?

A

Insider attacks are when members of an organisation intentionally or accidentally leak sensitive data about a network or person.

Prevented by: Strong Network Policies, User-access Levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a brute force attack and how can it be prevented?

A

Brute force attacks are when attackers use trial and error to crack passwords to gain access to networks.

Prevented by: Strong passwords, Locking login attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DoS attack and how is it prevented?

A

A denial of service attack is where an attacker floods a network with random requests to slow down a network to limit access.

Prevented by: Anti-Malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a passive attack and how is it prevented?

A

Passive attacks are where attackers passively monitor data travelling across a network, to then intercept and examine it before returning it back.

Prevented by: Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an active attack and how is it prevented?

A

An active attack is a planned attack that uses malware.

Prevented by: Anti-Malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is penetration testing?

A

Penetration testing is when specialists are employed to simulate attacks on a network to identify and fix weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is encryption?

A

Encryption is where data is scrambles into cipher text so that it is difficult to interpret if in the hands of criminals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is network forensics?

A

Network forensics are investigations on data within a network to find weaknesses in the security. They are also used to find the causes of previous attacks to help prevent future ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are User-Access Levels?

A

User-Access Levels are when different people are granted access to different information. In companies, highly-ranking employees have access to more sensitive information than lower-ranking employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Policies should…?

A
  • Force users to use strong passwords

- Install anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do passwords need to be strong?

A

Passwords help prevent unauthorised access to accounts and networks. A stronger password is harder to crack so is less likely to be subject to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Social Engineering?

A

Social engineering is when people (the weakest part of a system) are influenced and exploited by imposters to leak sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is phishing?

A

Phishing is a type of social engineering involving spam emails and texts to grasp the attention of recipients and lure them into clicking dodgy links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly