Network Security Part 2 Flashcards

1
Q

What is a backdoor in relation to network security?

A

A path into the network that is not protected. This can be installed by a “client program” or be a vulnerability in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can a user remove backdoors and what should they do after detection/removal?

A

To remove a backdoor a user might use:
1) an antivirus software scanning solution
2) clearing harmful programs from the system

After detection/removal:
1) software updates should be performed
2) All passwords should be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is buffer overflow?

A

Buffer overflow happens when a program attempts to store more data than available in the buffer memory. This causes data in adjacent buffers to corrupt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is denial of service?

A

Denial of service attacks prevent sites from carrying out their function by saturating the site with external communication requests limiting the site’s resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What 2 categories do DoS attacks fall into?

A

1) Buffer overflow attacks: causes machine to consume all available hard disk space, memory or CPU time

2) Flood attacks: saturates the server with an overwhelming amount of packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is malware?

A

Malicious software designed to corrupt your system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is phishing?

A

Collection of sensitive information by posing as a friendly entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Trojan Horse?

A

A class of malware that gives a hacker remote control of your system. Can also contain viruses and worms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a virus?

A

Hidden in self replicating code and needs a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a worm?

A

A program that can run independently and replicate itself to infect other hosts in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a keystroke logger?

A

A program that runs in the background and logs all keystrokes. The keystroke data is then sent back to the hacker and is analyzed for sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is spoofing?

A

Masquerading as a friendly entity to entice a user to give out sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between phishing and spoofing?

A

Spoofing masks as a legitimate user account in order to steal a user’s identity but phishing involves creating fake websites or email addresses to gain sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly