Unit 4 - Network Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is malware

A

Malware is any software intenionally designed to cause damage to a computer,server,client or computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the 7 types of malware ?

A

Trojans,spyware,adware,rookits,ransomware,worms,keyloggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the malware virus ?

A

They replicate their code in other programs

They infect other computers

Theu harm the computer by delecting corrupting or modifying files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What malware is a worm

A

A worm replicates its self in order to spread to other computer.
They slow down networks and computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a trojan horse ?

A

They have a program that the user wants. However they also have a negative code that can then cause damage,take control,provides access to the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ransomware ?

A

Holds a computer hostage by locking or encrypting access to it.
If the data is encrypted not even a cyber security professional can recover it. Once the ransom is paid to the attacker access is restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a brute force attack

A

A hacker will try every combination or password until the correct answer is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does SQL stand for?

A

Structured query language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an sql injection ?

A

Takes advantage of web inputs forms to access or deystroy data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is social engineering ?

A

Deception to gain personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is denial of service attacks ?

A

Flooding a server or network with pointless requests so that is fails or slow down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is data interpretation and theft ?

A

Stealing data or intercepting it with a man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name 4 common preventation methods

A
penetration testing
• anti-malware software – including anti-virus software
• firewalls
• user access levels
• passwords
• encryption
• physical security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is penetration testing ?

A

Is the practice of deliberately trying to find security holes in your own system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is anti malware software ?

A

Anti-malware software will detect malware such as viruses, worms, trojans, and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is encryption ?

A

Encryption is a way of securing data so that it cannot be read without the encryption key

17
Q

What are firewalls

A

is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules

18
Q

What are user access levels

A

They are set by an admin. On how much a user can edit or see of a disk,folder and indivdual files

19
Q

What are Password policys?

A
chosen password has features like
• Minimum length of characters
• Include at least one lowercase letter
• Include at least one uppercase letter
• Include at least one symbol
• Change password every month
20
Q

What is physical security

A

hardware, software and networks are protected by physical methods

21
Q

Name 4 examples of physical security ?

A
  • CCTV
  • Intruder alarms
  • Locks on doors or cabinets
  • Fences, walls, barbed wire
  • Security guards
  • ID cards and signs
  • Turnstiles and gates
22
Q

What are operating systems

A

Manage computer hardware, users and the resources used by the software.
Example multitasking, user managment, file managment

23
Q

What are graphical user interfaces

A

Pointers, icons, menu, drag and drop, windows

24
Q

What are the different types of user interfaces ?

A

Graphical user interfaces, command line interface, menu -driven interface

25
Q

What are interrupts

A

Are signals sent to the cpu by external devices to indicate an event that needs immidediate attention

26
Q

What is the difference between hardware and software interrupts

A

Hardware - generate by hardware devises. Printer out of paper
Software - are generate by programs. A wrong password will cause an error message

27
Q

What are the forms of network attacks?

A
Passive 
Active 
Insider 
Brute force 
Denial of service
28
Q

What is a passive attack

A

monitoring data across network and intercepting any sensitive information they find (through the use of network monitoring hardware and software

29
Q

What is an active attack

A

attacking a network with malware or other planned attacks

30
Q

What is a brute force attack

A

trying to gain access by using many password combinations