Security Flashcards

1
Q

Which kinds of malware are spread by piggybacking?

A

Trojan, Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What harm does the virus, ransomware do?

A

Locking the computer or files until money is sent/received. Potentially deleting files if nothing is sent fast enough

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is spyware often built into software with a legitimate purpose?

A

To encourage users to download and install it, allowing the owners to collect data that can be profiled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the usual end goals of a direct hacking attempt?

A

To gain access to records or commands where high level instructions can be run to control or damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does Public Key Encryption keep data secure?

A

Data secured with a public key can only be decrypted with a corresponding private key as the encryption is one way. If the public key is widely shared the data is still secure as long as the private key remains secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the major vulnerabilities of a firewall?

A

It allows connections that appear legitimate to get to applications that have been set up to run. These vulnerabilities may be exploited and the firewall would not interact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the two different types of protection that are part of a network and often separate to a desktop computer?

A

Firewall and Proxy server. A Firewall can run on a local machine or remotely while the Proxy must be remote

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the most common types of security problems that affect small businesses?

A

Phishing attempts are the most common, taking advantages of lax security practises and a lack of expertise in security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does Polymorphic Code cause problems for antivirus?

A

It changes the code within a piece of malware, which can make the malware appear to be different from how it’s expected to appear.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption is often measured in bits. What does that mean?

A

It refers to the length of the key used to encrypt and decrypt data. Each digit in the key must be known to secure or access data, a larger key becomes more difficult to crack offering exponentially more possible variations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does heuristic based analysis work?

A

A method of detecting viruses by examining code for suspicious properties and what an application can do and can use to identify variants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly