Network security Flashcards

1
Q

Security Threats

A

Network security must consider the environment, as well as the tools and requirements of the network. It must be able to secure data while still allowing for the quality of service that users expect of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Viruses, worms, and Trojan horses

A

These contain malicious software or code running on a user device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spyware and adware

A

hese are types of software which are installed on a user’s device. The software then secretly collects information about the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Zero-day attacks

A

Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threat actor attacks

A

A malicious person attacks user devices or network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Denial of service attacks

A

These attacks slow or crash applications and processes on a network device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data interception and theft

A

This attack captures private information from an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identity theft

A

This attack steals the login credentials of a user in order to access private data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security solutions

A

No single solution can protect the network from the variety of threats that exist. For this reason, security should be implemented in multiple layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Antivirus and antispyware

A

These applications help to protect end devices from becoming infected with malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Firewall filtering

A

Firewall filtering blocks unauthorized access into and out of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly