Paper 1: Network Threats and Security Flashcards

1
Q

What is Malware?

A

Software that damages or deletes data.

Malware and virus are often used interchangeably.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you prevent Malware?

A

Use Anti-Virus / Anti-Malware software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Phishing?

A

Email that pretends to be a genuine company to deceive users into providing personal details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you prevent Phishing?

A

Use a spam filter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Social Engineering?

A

A form of attack that tricks or manipulates people into giving away critical information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you prevent Social Engineering attacks?

A

User training to avoid clicking on suspicious emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Brute Force Attacks?

A

A program attempting all possible password combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you prevent Brute Force Attacks?

A

Use strong passwords, set a number of password attempts, and implement a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Denial of Service Attacks (DOS)?

A

Attacks that flood the network with useless traffic, making it slow or inaccessible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you prevent Denial of Service Attacks?

A

Use a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Data Interception & Theft?

A

Data transmission being read by an unauthorized user or program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you prevent Data Interception & Theft?

A

Use encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SQL Injection?

A

SQL code inputted as data, potentially causing errors or unintended operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do you prevent SQL Injection?

A

Use a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Penetration Testing?

A

Deliberate attempts to hack into a network to identify and correct weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Network Forensics?

A

Investigation into data to determine why an attack occurred.

17
Q

What are Network Policies?

A

A set of rules and procedures designed to prevent vulnerabilities.

18
Q

What is Anti-Malware Software?

A

Software designed to prevent malicious software from damaging a computer.

19
Q

What are Firewalls?

A

Hardware or software that prevents unauthorized access to a network.

20
Q

What are User Access Levels?

A

Settings that control who can access a network and what they can see.

21
Q

What is Encryption?

A

A method used to scramble data sent over a network to protect it from being read.

22
Q

Fill in the blank: A _______ is a set of letters, characters, and numbers that helps prevent unauthorized access.