security and data management Flashcards

1
Q

What is malware

A

Malware is a type of program that can replicate itself and cause a computer to malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List different malware

A

Virus, worms, ransomware, spyware, root kits, Trojan horses, and back doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List some measures to prevent malware attacks

A

Installing anti-virus software, backing-up a system in off-site mode, updating operating systems and browsers and avoiding downloads of email attachments from unknown senders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is phishing

A

Phishing is a type of attack to obtain security-related information such as passwords by disguising as a trustworthy entity through electronic communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are phishing emails filtered

A

Email service providers filter phishing emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Denial of Service (DoS) attack

A

Denial of Service attacks prevent a user from accessing part of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In what ways do attackers intercept and steal data

A

By using hijacking software and pretending to be the destination across the network. Also, by using packet sniffing software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does packet sniffing software do

A

Packet sniffing software examines data packets in a certain route and by using a network switch an attacker manages to examine all the data packets at a certain IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can a user defend himself against brute-force attacks

A

Using long passwords with lowercase, uppercase, numbers and special characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the steps involved in penetration testing

A

Identifying a vulnerability,
Setting up an attack,
Carrying out the attack,
Testing the ability of the system to recover any lost or corrupted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List some of the functions of a firewall

A

Checks whether the incoming and outgoing data meet the set of requirements,
Prevent malware, hackers and DoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a firewall do when any data moving in or out of a network does not meet the requirements of network manager

A

A warning is issued and the data is blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List some areas covered by network policies

A

Acceptable use policy, archiving, passwords, email, web, remote access, wireless network, servers and incident response plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an incident response plan

A

In case of a security failure, a plan is established to recover from it, which is called an incident response plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the functions of an archiving policy

A

It decides the location where the data has to be moved, how it should be moved and how to get it back when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is compression used for

A

To reduce the size of the files and to reduce the download time of image, audio and video from the Internet

17
Q

What are the two types of compression

A

Lossless compression and lossy compression

18
Q

What is lossless compression

A

When the file is compressed, the quality of the image remains the same and the file can be reconstructed to its original form

19
Q

What is lossy compression

A

When a file is compressed, the unnecessary bits of information are removed permanently

20
Q

What are the file formats for images

A

PNG, JPEG and GIF

21
Q

Which file format is used to store animated graphics

A

GIF

22
Q

What is an MPEG

A

MPEG (Moving Pictures Experts Group) is a standard to encode audio-video files that uses lossy compression technique

23
Q

What is the file format for DVD movies

A

MPEG

24
Q

What attributes of a video file are affected due to compression

A

Compression reduces the resolution, dimensions and bit rate

25
Q

What are codecs

A

Codecs are programs that encode or decode an audio, image or video file

26
Q

What are compression codecs

A

Codecs that are aimed at reducing the size of a file without affecting its quality

27
Q

What is run length encoding

A

Run length encoding (RLE) is a compression algorithm that converts the consecutive similar values into a code