revision Flashcards

1
Q

What is malware also known as

A

malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do viruses work

A

attaches itself to files or programs on a computer and causes damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do Trojan horses work

A

misleads user of its intent to get into their computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does DDOS stand for

A

distributed denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of penetration testing

A

to check for vulnerabilities in a controlled environment so they can be fixed before they are maliciously exploited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are user access levels and why are they good

A

allow an administrator to set up a hierarchy of users and lower level users cannot access sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a password

A

typically a string of characters used to gain access to a system,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bio metrics can be used in addition to character passwords, examples include voice and face recognition, why might they be used

A

they are almost impossible to forge, you always have them with you, reduces password rest costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of method is a brute force attack

A

trial and error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What makes a strong password

A

12 or more characters and a mixture of capital and lower case letters, numbers and symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Using the key of 3 what does abzovmqba mean

A

decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does social engineering rely on

A

human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the most common way phishing attacks are sent

A

emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what do users need to decipher encrypted messages

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does SQL injection work

A

malicious code is entered into a query into a SQL database to gain data and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly