Topic 4.2 - Network Security Flashcards

1
Q

What is asymmetric encryption

A

encrypts and decrypts data using two separate keys - public key and private key - you use the other persons public key to encrypt it and they sue their private key to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is symmetric encryption

A

algorithms encrypt and decrypt a message using the same key - both sides must know the exact same key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are the 5 types of malware

A

virus, worms, trojans, ransomware, keyloggers/spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how does ransomware operate

A

Ransomware downloads malicious software that encrypts the user’s file and the user must pay to decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

why is data on networks encrypted

A

To prevent unauthorised access so that data remains confidential by making it unintelligible because it is scrambled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how can companies prevent breaches from their own employees (4 methods)

A

Background checks, Access control, Physical security, User policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how do software and hardware firewalls work together to enhance data security

A

Hardware firewalls blocks malware before it can enter your network and software firewalls inspects the network traffic that makes it through the firewall to ensure there isn’t any malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a firewall

A

network security acting as a barrier between the internet and organisation’s network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the ways to prevent unauthorised access (5 ways)

A

Encryption, access control, authentication, firewall, physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Encryption

A

uses a key to encode the data so only the person with the correct key can decipher it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the factors in a multi-factor authentication and give examples

A

piece of information (password, pin)
physical object (ID card)
physical attribute (fingerprint)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is penetration testing

A

a hacker employed by the company to look for weaknesses and vulnerabilities to be fixed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly