Network Security Threats Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a passive attack?

A

Where someone monitors data travelling on a network and intercepts it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an active attack?

A

When someone attacks the network with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an insider attack?

A

When someone within the network exploits their network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a brute force attack?

A

Where an attack is attempted using trial and error, guessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a denial-of-service attack?

A

Where a hacker tries to stop users from accessing a part of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is malware?

A

Software that is installed on someone’s device without their knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does malware do?

A

scareware, rootkits, spyware, locking or deleting files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can malware be installed on someones device?

A

Viruses, Worms, or trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is social engineering?

A

A way of gaining sensitive information by influencing people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does SQL stand for?

A

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are SQL injections?

A

Pieces of SQL typed into a website’s input box which then reveal sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What will a good network policy always look like?

A

Encrypt sensitive data, install anti-malware software, use strong passwords, Regular tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is penetration testing?

A

When organisations employ specialists to simulate attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are network forensics?

A

Investigations undertaken to find the cause of an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are user access levels?

A

Control over which parts of the network different groups of users can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly