Network Security Methods Flashcards

1
Q

How would you set up user access rights

A

The network manager will set it up and will define groups and allocate specific permissions to those groups. The people using the network will be assigned to a group and all permissions related to that group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do user access rights do

A

They stop people from accessing a file that they don’t need to see and they people who can see the file won’t be able to edit them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a network policy

A

a document that sets out the rules and procedures to help protect the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three types of network policies

A
  • Acceptable use policy
  • Recovery policy
  • Back up policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the use of a back up policy

A

This saves another copy of data in case the original data is lost or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the use of a recovery policy

A

In case if there is a fire, flood or a complete network breakdown then the recovery policy is there to get back the network and data ASAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are network forensics used for

A

To stop an attack on your network and determine what occurred in order to stop it from happening again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the most common way of looking what causes a network problem

A

Examine the system logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a system log do -

A

It keeps a record of everything that takes place on the network this is so it can record the data packets sent and recieved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does an Anti-Virus do

A

This is an app that detects a computer virus. It has a database of virus signatures and looks out for typical virus behaviour such as modifying important system files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Anti-Malware do

A

Because malware aren’t all viruses sometimes malware can detect key strokes or it can take control of your computer remotely. Anti-Malware can detect this and remove it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a firewall do

A

It sets the rules for how data packets can enter or leave the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is encryption

A

the process of scrambling a message or data in such a way that only the person knowing the correct key can read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does encryption help as another line of defence

A

Even if a network is accessed by an unauthorised person the data is encrypted to make is confidential and unreadable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the method to encrypt a message

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly