Preventing vulnerabilities * Flashcards

1
Q

List the 8 techniques for preventing vulnerabilities

A
  • penetration testing
  • network forensics
  • network policies
  • user access levels
  • secure passwords
  • encryption
  • anti-malware software
  • firewalls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is penetration testing? (2 points)

A
  • determine how resilient a network is against an attack
  • probe network for potential weaknesses and attempt to exploit them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is network forensics?

A
  • monitoring the traffic on a network
  • at regular intervals transmitted data packets are copied
  • these are stored for later analysis
  • information gathered can help identify invasive traffic (from hackers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are network policies? (10 points)

A

policies that ensure:

  • users have secure, hard-to-guess passwords
  • users change their passwords on a regular basis
  • users cannot connect unauthorised equipment to a network
  • levels of access are given
  • regular backup procedure is in place
  • disaster recovery procedure in place
  • regular penetration testing
  • regular maintenance
  • maintaining high level of security - firewalls, anti-virus software
  • preventing physical access to servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are user access levels?

A

determine the facilities a user has access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encryption?

A

the process of disguising data so that it cant be understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three purposes of anti-malware

A
  • to detect malware
  • to prevent malware from being installed
  • to remove malware from the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are firewalls?

A

a tool that monitors traffic going into and out of a computer or a network and either allows traffic to pass or blocks it, based on the firewall policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly