Preventing Vulnerabilities Flashcards
1
Q
What is the purpose of a penetration test?
A
- To review the system’s security to find any risks or weaknesses and to fix them.
2
Q
Internal penetration tests:
A
- Done to see how much damage could be done by somebody within the company with a registered account.
3
Q
External penetration test:
A
- Are for white hat hackers to try and infiltrate a system from outside the company.
4
Q
Blind penetration tests:
A
- Are done with no inside information, to simulate what a real attacker would have to do to infiltrate the system.
5
Q
Targeted penetration tests:
A
- Conducted by the company’s IT department and the penetration team cooperating together to find faults in the system.
6
Q
What is anti-malware software used for?
A
- To locate and delete malware, like viruses, on a computer system.
7
Q
How does anti-malware software work?
A
- The software scans each file on the computer and compares it against a database of known malware.
- Files with similar features to malware in the database are identified and deleted.
8
Q
Why must anti-malware software be updated regularly?
A
- New forms of malware are created daily so we need to keep systems secure.
9
Q
Other roles of anti-malware software:
A
- Checking all incoming and outgoing emails and their attachments.
- Checking files as they are downloaded.
- Scanning the hard drive for viruses and deleting them.
10
Q
What does a firewall do?
A
- Manages incoming and outgoing network traffic.
11
Q
How do firewalls work?
A
- Each data packet is processed to check whether it should be given access to the network by examining the source and destination address.
- Unexpected data packets will be filtered out and not accepted to the network.
12
Q
Other roles of a firewall include:
A
- Blocking access to insecure / malicious web sites.
- Blocking certain programs from accessing the internet.
- Blocking unexpected / unauthorised downloads.
- Preventing specific users on a network accessing certain files.
13
Q
Secure Passwords:
A
- Usernames must be matched with a secure password to minimise the chances of unauthorised users accessing a system.
- Passwords should contain a mix of uppercase and lowercase letters, punctuation and numbers.
- Passwords should be of a substantial length (>= 8) and should be regularly changed.
14
Q
What are access levels used for?
A
- Used to only allow certain users to access and edit particular files.
15
Q
Read-Only Access:
A
- When a user can only view a file and is not allowed to change any data.
- e.g a teacher might set read-only homework instructions.