Network Security And Threats Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a firewall?

A

A security checkpoint designed to prevent unauthorised access between two networks, usually involving an internal trusted and an external network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a typical firewall consist of?

A

A separate computer containing two Network Interface Cards (NICs), with one connecting to an internal network, the other to an external network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens when special firewall software is used?

A

Each data packets attempts to pass between the two NICs is analysed against preconfigured rules and then accepted or rejected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the preconfigured rules in a firewall called?

A

Packet filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is packet filtering also called?

A

Static filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does packet filtering do?

A

Controls network access according to network administrators rules and policies by examine the source and destination IP addresses in packet headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What reasons can static filtering block packets for?

A

Block packets based on the protocols being used and the port number they are trying to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a port?

A

Is where a client reaches the right computer or network at the right IP address and for example allows the client to download the packets data to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of certain protocols using particular ports?

A

Telnet, is used to remotely access and uses port 23 so if Telnet is disallowed by a network administrator, any packets attempting to connect through port 23 will be dropped or rejected to deny access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between a dropped packet and a reject packet?

A

A dropped party Is removed quietly while a rejected packet will cause a rejection notice to be sent back to the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What us a proxy server?

A

Interrupts all packets entering and leaving a network, hiding the true network addresses of the source from the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does using a proxy server do for the user?

A

Enables privacy and anonymous surfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can proxy servers help commonly voters websites?

A

By maintaining a cache of commonly visited websites and return the web page data to the user immediately without the need to reconnect to the Internet and re-request the page from the website server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can proxy servers control over the content that users may demand?

A

They are often used to filter requests providing administrative controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is encryption?

A

Encryption is one way of making messages travelling over the Internet secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are all types of malware or malicious software?

A

Worms, Trojans and viruses

17
Q

What do worms and viruses have the ability to do?

A

Self-replicate by spreading copies of themself

18
Q

What’s the difference between a worm and a virus?

A

Worms are a sub-class of viruses, but viruses rely on the host files to be opened in order to spread themselves, whereas worms do not

19
Q

What type of virus resident is most common?

A

memory resident

20
Q

What happens tot eh virus once it is in memory?

A

Any other uninfected file that runs becomes infected when it is copied into memory

21
Q

Where do other common virus reside?

A

In macro files usually attached to word processing and spreadsheet data files, that infect data files once created and are usually less harmful

22
Q

How does a worm get into a system?

A

Resides within a data file and enter the computer through a venerability or tricking the user into opening a file

23
Q

How does a worm replicate?

A

A worm can replicate itself and send copies to others user from your computer

24
Q

Why can worms be responsible for causing computer or servers to slow?

A

Worms are often reasonable for using up bandwidth, system memory or network resources

25
Q

What is a trojan?

A

A type of malware that manifests it self in something useful file, games or utility

26
Q

What are some uses for Trojans?

A

To harvest personal information, or use your computer power or network bandwidth to send thousands of spam emails

27
Q

What is a difference from viruses, worms and Trojans?

A

Trojans cannot self-replicate

28
Q

What is the weakest point in security?

A

Humans

29
Q

What di many malware attacks exploit?

A

‘buffer overflow’, which occurs where a program accidentally writes values to memory locations too small to handle them, and inadvertent overwrites the value in neighbouring location

30
Q

What is a result of ‘buffer overflow’?

A

Overflow data is often interpreted as instructions

31
Q

What is another example of social engineering threats?

A

Phishing (persuading individuals to open files, internet links and emails containing malware)