Network Security and Systems Software part I Flashcards

1
Q

What is a virus?

A

A form of malware that is installed without your knowledge. It imbeds itself in programs, infecting them. It then can spread to other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a worm?

A

A standalone program that scans the internet automatically looking for computers to infect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a trojan?

A

A trojan is a program that masquerades as having a legitimate purpose but actually has malicious intentions. It is often spread via email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is social engineering?

A

tricking or persuading people into revealing personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List three signs that someone should lookout for when checking if an email is phishing?

A
  • Spelling and punctuation errors
  • The email not being addressed to the user personally
  • Sense of urgency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is blagging?

A

the act of knowingly or recklessly obtaining r disclosing personal data without consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a brute force attack?

A

An attack in which a list of passwords is tried until access is gained to the account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DoS attack?

A

These are attacks to prevent legitimate users from accessing a website. One way of this is to flood a network with useless traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List 2 methods that can prevent data theft

A
  • Destroying paper documents when they are no longer needed

- Logging off computers when not in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an SQL injection?

A

a technique that exploits security weaknesses in a website. It does this by inserting malicious code into a database field on a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is penetration testing?

A

A company deliberately breaking into their system to see the faults, and then attempt to solve them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List 2 ways that anti-malware software can protect a computer

A
  • It prevents harmful documents from being installled on the computer
  • It prevents important files, such as the OS from being deleted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List 2 things that a firewall does

A
  • prevents unauthorised access to or from a private network

- stop computers on a network from accessing specific sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List three ways a password can be made secure

A
  • at least eight characters long
  • uses numbers symbols and letters
  • do not share with others
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are user access levels?

A

a setting that should be set for disks folders and files, so users can only access what they need to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List 2 elements of physical security that can be implemented

A
  • guards

- cctv cameras