Network Threats Flashcards

1
Q

What is Malware?

A

Malware is software that is designed and destroy computers and computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is phishing?

A

A scam by which an e-mail user is fooled into reavealing personal or confidential information which a scammer can use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is social engineering (attacks)?

A

Deception to gain personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are brute force attacks?

A

A hacking method that uses error to crack passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are denial of services attacks?

A

An attack meant to shut down a machine or network, making it unreachable to its intented users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data interception and theft?

A

Stealing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a SQL injection?

A

Using web forms to add SQL instructions to a query that cause data loss or the reavealing of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why do hackers use SQL injections?

A

When a hacker cannot see vulnerabilities in the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does SQL stand for?

A

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List three softwares that harm a computer

A
  1. Malware (Virus)
    (worms, Trojans and ransomware)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What types of prevention methods stop malware harming a computer?

A

Anti-Virus, Anti-Malware or backup and recovery procedures .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are worms in computer science?

A

A worm is a form of malware copies itself in order to spread to the computers.
They slow down networks and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Trojan Horse Virus

A

A type of malware that downloads onto computer disguised as a recongnized program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a ransomware?

A

A malware designed to deny a user or access to files on their computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an encryption software?

A

Prevents unauthorized access to sensitve data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a defragmentation software?

A

Rearranges fragmented data so your disks and drives can work more effciently.

17
Q

What is data compression software?

A

It can dramatically decrease the amount of storage a file takes up.

18
Q

What are two types of data compression?

A

Lossless and lossy

19
Q

What is penetration testing?

A

Penetration testing is the practice of deliberately trying to find security holes in your own systems

20
Q

What is anti-malware software?

A

Software will detect malware such as viruses, worms, trojans, and spyware.

21
Q

What are firewalls?

A

Protect from unauthorized access with a firewall.

22
Q

What is a user access levels?

A

User access levels define what information the different users on your account can access and edit.

23
Q

What are passwords?

A

A secret word that must be used to gain access to a place.

24
Q

What is encryption?

A

Encryption is the process of disguising a message so that it cannot be understood by anyone for example the Caesar cipher: You replace the letters with other letters.

Example: Vhh brx wrqljkw see you tonight

25
Q

What is physical security?

A

It is the protection of hardware, software, networks and data.

26
Q

What is a user interface?

A

It provides a method for users to interact with a computer

27
Q

What is memory management and multiasking?

A

Memory management- manages programs and data stored in RAM, frees up memory when a program is closed.

Multitasking- running two or more programs at once.

28
Q

What is peripheral management and drivers?

A

The management of devices such as mice and printers.

29
Q

What is a user management?

A

Management of usernames and passwords along with what they have permission to access.

30
Q

What is a file management?

A

A file management system is used for file maintenace operations.