Unit 4:Network Security And System Software✔️ Flashcards

1
Q

What are the goals of penetration testing - “pen” testing

A

-identify targest of potential attacks
-identify entry points
-attempt to break in
-report back findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does anti-malware software do?

A

Protects network /system agaist malware(trojans,virus,worms) Detects the malware reports it to anti-malware company -virus is confirmend and signature is created of the virus - added to database - users urged to update software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is encryption?

A

A way of secuing data so it cannot be read without an ecryption key
Change plain text to cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encyrption of transmitted data?

A

Website use HTTPS(Secure Hypertext transfer protocol) encrypt the conection to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of encrypting drives ?

A

Prevents hackers from understanding the conent of the hard drive if removed or installed on a different computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a firewall

A

-seperates a trusted network from an untrusted network(normally the internet)
-packets entering are checked
-run on dedicated hardware or as software
-built into wifi routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the job of the firewall?

A

Checks packets to see where they are coming from and going to for malcious content like viruse,trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall features?

A

-Prevents attackers gaining access to computers on network
-block packets from a certain ip address
-block inappropiate or malcious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Issues with firewall?

A

-software firewalls slow down a computer
-dedicated hardware firewalls are expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are user access levels?

A

Controls which part of the network users can access and edit such as:internet,emails and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is password policy?

A

Organisation and computer systems will often have password policy which determine what features the password must include.
Eg,numbers,8 letters ling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Physical security?

A

Where hardware,software and network are protecte by physical methods.
Examples:CCTV,alarms,locks,fenses,guards,id cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is packet inspection?

A

When a firewall will look at data inside each packet to see if it contains mallicious content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is malware?

A

Malware are executable programs that run on a compuer.
Example:virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do viruses do?

A

-replecate their code in other programs
-infect other computers
-delet,corrupt and modify files
-need to be opened by human(not self replicating)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do worms do?

A

-normally do not cause damage to computer
-might slow down network and computers
-replicate without human intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What do trojans do?

A

Usually program,game or craked file user wants but contains code which causes damage,takes control or provides access to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is ransomware?

A

-holds computer hostage-locks user out - encrypts access
-nearlly impossible to get data without backup
-once ransom paid access is restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is social ingineering?

A

Ability to obtain confidential information by appearing professional and secure/safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is shoulder surfing?

A

Ability to obtain information by observing someone as the type it it.
Eg:standing behind them,ussing cctv cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is phishing?

A

-type of social engineering
-emails,text,phone calls send to user seem legit and try to get your password,usernames,credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a denial of service attack(Dos)

A

-attacker sends many requests to server (known as a flood)
-sever can not respond fast enough so slow down or goes ofline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a distributed denial of sevice attack (DDoS) ?

A

Many computers are used to send requests and flood and server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a Man-In-the-middle attack (MITM) ?

A

When a hacker is able to intercept communications between the user and server.
Can then eavesdrop to find passwords and personal info.
Easy to perform on unecrypted wifi

25
Q

What is a brute fore attack?

A

Hacker will try every combination of the assword until correct password is found

26
Q

What is an SQL injection?

A

Using web forms to add SQL instructions to cause data loss or the revealing of personal information

27
Q

Function of an Operating system?

A

-user interface
-memory management and multitasking
-Periphreal managment and drivers
-user managment
-file managment

28
Q

Examples of operating systems?

A

Windows,apple ios ,linux

29
Q

What is system software?

A

System software is the software that provides a platform for other software to work.

30
Q

What do operating sysetms do?

A

Manage computer hardware and resources used by software.
Manage:user interface …. ext

31
Q

What are user interfaces?

A

Provides a method for users to interact with a computer - example is graphical user interface(GUI)

32
Q

Deskto interfaces?

A

-Windows
-menus
-icon
-pointers

33
Q

Types of user interface?

A

-menu-driven interface
-command line inter face (CLI)
-graphical user interface (GUI)

34
Q

Pros of command line interface?

A

-requires little proccessing - can save money on graphics cards
-faster than using a mouse
-requires less hdd space
-less ram needed

35
Q

What is command line interface (CLI)

A

Text commands entered into interface

36
Q

Where are menu-driven interfaces used ?

A

Menu-driven interface often used by devices that have a dedicated function eg ATM machine or MP3 player

37
Q

What is multi-tasking?

A

Where an operating system manages many tasks at the same time.
Eg web browser open while listening to music and messaging friends
-OS decides which process will next run on the cpu and for how long

38
Q

What are interrupts?

A

-Interrupts are signals sent to the cpu by external devices to indicate an event that needs immediate attention.
-cpu suspens current activities to execute appropriate instructions

39
Q

What are hardware interrupts?

A

Generated by hardware devices eg printer out of painter

40
Q

What are software interupts?

A

Generated by programs eg 0 divided by 0 will generate an error message

41
Q

What is peripheral managment?

A

-OS must manage inputs and send out outputs to devices
-example of peripherals: mice,keyboard,webcam,microphone

42
Q

What are devie drivers?

A

Device driver is a program that controls periphreal devices such as printer,mice and displays
-each device communicates via its own driver

43
Q

Hard disk?What peripheral are they?

A

-hard disk - storage peripheral-stores computers data,can be encrypted

44
Q

File managment and the operating system?

A

-Manages where the disks files are written
-keeps track of where they are so they can be retrieved
-make sures the files are not overwritten

45
Q

Features avaiable with file managment?

A

-naming files
-moving file
-saving files
-deleting files

46
Q

User managment?

A

Operating system is resonsible for password and user logins.
-stores passwords in a database

47
Q

What are Access rights?

A

-if a computer used by more the 1 person they should only see their files
-users and system admins have different levels of access rights
-some user may only be allowed to read files not edit them

48
Q

What is utility software?

A

Utility programs perfrom extra functions and housekeeping jobs to help keep the computer functioning-often packaged as part of OS - example: antivirus software

49
Q

Utility software example?

A

-encryption software
-defragementation software
-data compression
-house keeping tools - disk clean up ext

50
Q

What is encryprtion software?

A

Software used to encrypt sensetive data-changes plain text to cipher text - can not be understood without key

51
Q

How to know if web browser is encrypted?

A

There is usually a padlock for sites that are using HTTPS

52
Q

What does HTTPS stand for?

A

Hypertext transfer protocol secure

53
Q

Organisations that use email encryption?

A

-companies sharing internal files
-accuntant disscussing financial information
-schools sharing info about students

54
Q

What are encryption software utilities used for?

A

-encrypt storage on Hard drive - cant be understood if stolen
-encrypt files on portable usb/removable storage
-encrypt communication with websites

55
Q

What is data decompression software?

A

Utilities like WInZip allow users to compress files/folders
-reduce amount of space used on hard drive
-reduces amount of data sent when sending files
-more data can be stored on backup media

56
Q

What does defragmenting the hard disk do?

A

Reorganises the files - they are stored together-reuces load times

57
Q

Pros of defragmenting?

A

-read times are faster
-free space in one location - new files dont need to be fragmented

58
Q

What does it mean if a file is ‘fragmented’

A

If you save a large file it might not fit on the disk in consequtive memory locations so it is split up.

59
Q

Issues with ‘fragmentin’ files?

A

-drive head needs to moe to more locations to read file
-slowe to access files/programs