Security Flashcards

1
Q

Name 5 ways in which a virus can infect a computer

A
Infected Backing Storage
Spread by an infected USB stick
Visiting Infected/Compromised Websites
Install Software
Opening an infected email
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 4 things a virus can do

A

Camouflage - dummy instructions
Watching - waits till particular action is met
Replication - self-replicating
Delivery - payload is activated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name 4 ways in which an anti-virus software can detect virus’

A

Use of checksum
Searching for a virus signature
Heuristic detection
Memory Resident Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are 4 hacking methods?

A

Brute Force
Back Doors
Exploiting vulnerabilities
Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you spot a phishing attempt?

A
Look at the Subject
Senders Address
Expect to know your name
Look for hyperlinks
Spelling and Grammar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name 5 different types of DOS attacks

A

Physical - break wires
Exploits - vulnerabilities in the program
Bandwidth Starvation - flood server with information
Hardware Attacks - routers may be modified
Resource Starvation - Using up their backing storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What might be some costs after a DOS or DDOS attack

A

Determining the nature of the attack
Repair and response to the attack
Devising and implementing safeguards
Additional admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between a passive and an active attack

A

Passive - where an attacker may just monitor a network

Active attacks - when data will actively modified, like changing it or deleting it on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two ways to encrypt data

A
Symmetric key (secret)
Asymmetric key (private/public)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name pros and cons of assymmetric encryption

A

Pros - Private key never needs distributing
Can be used to implement digital signatures
Cons - Slower than symmetric
Requires far more power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name pros and cons of symmetric encryption

A

Pros - key doesn’t need sent with message
System is more straightforward
Cons - Key has to be installed with the receiver first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What 3 things can a digital certificate contain?

A

Public key
Owners name
Expiration and Issuer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What problems arise with client side validation?

A

Users can modify the code
Not all users have scripting running on browsers
Coding Errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name some biometrics.

A
Fingerprints
Hand biometrics
Palm vein biometrics
Facial recognition
Voice Recognition
Retina/Iris Scan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some advantages of using biometrics?

A

Don’t have to remember passwords

Reduces fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is one disadvantage of using biometrics

A

If you are being hacked you cannot change your biometrics like you can a password

17
Q

Name 5 ways a denial of service attack does to a web server?

A

Bandwidth Consumption-flood with traffic
Server Memory- flood memory
CPU Usage-force server to run other tasks
Hard Disk Space - Copy data to hard disk
Database Space - Prevent from saving data