System Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Name five methods of attacking a network

A
Brute force attack
Denial of service attack (DoS)
Data interception
SQL injection
Zero-Day attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a brute force attack?

A

Automated software is used to try millions of passwords and usernames to find one that works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a denial of service attack?

A

Slow down a server greatly or cause the server to crash by overloading the server with requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is data interception?

A

By intercepting data packets moving through a network, they can be decoded in order to obtain sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SQL injection?

A

Entering SQL code into a user input field, such as a search bar, when the request is sent to the server, it will run the SQL code, allowing you to gain access to the data in the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a zero day attack?

A

The day a major security fault is found in software, usually just after it has been released. This day is known as zero-day. As hackers rush to exploit the fault and developers rush to fix it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List 4 ways of improving a networks security

A

Every user having a strong password
Restricting access rights to parts of the network to users who do not need them
Encrypting important data
Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the acceptable use policy for a network?

A

A set of conditions and rules that a network user mjst agree to in order to use the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give some examples of things that could be on an acceptable use policy

A

Must not install software
Must not access data for which the user has not been authorised to access.
Must not download files from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a network’s backup policy?

A

The policy to follow when a network is being backed up.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List some things that could be included in a backup policy

A
Who is responsible for the backup
When the backup is made
Where the backup is kept
How often backups will be done
How long the backups will be kept
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a network’s disaster recovery policy?

A

The set of procedures that the owner of the network will follow to restore normal network operations after a natural or man-made disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is penetration testing?

A

Testing a network to see if it is vulnerable to attacks. The owner of the network may hire someone externally who has no knowledge of the network to do the testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly