1.4 - Network Security Flashcards

1
Q

What is malware?

A

Malicious software that is designed to disrupt, damage or gain unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of malware?

A

Viruses, Worms, Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus?

A

Malware that replicates code in other programs, before deleting, corrupting or modifying files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a worm?

A

Malware that replicates itself in order to spread to other computers, so that it can slow down networks and computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Trojan Horse?

A

Malware that pretends to be legitimate software, but has the purpose of causing damage, or gaining unauthorized access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ransomware?

A

Malware that holds a computer hostage (by locking/encrypting it) until money is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What network vulnerabilities can hackers exploit?

A

Unpatched software; out-of-date anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is social engineering?

A

The ability to obtain confidential information by asking people for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is phishing?

A

The fraudulent practice of sending emails, pretending to be from a reputable company, but the aim is to try and get users to reveal their confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a brute force attack?

A

Automated software used to generate and test every combination of password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Denial of Service attack?

A

Flooding a server with useless traffic, to make the server overloaded and unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Data Interception (/Theft) attack?

A

The unauthorised act of stealing computer-based information from the victim, the aim is to obtain personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How may an SQL injection be used as a form of attack?

A

Data records can be modified or added by inserting additional code into an input box.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can we protect against network vulnerabilities?

A

Penetration testing

Anti-malware software

Firewalls

User access levels

Strong passwords

Encryption

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is penetration testing?

A

Trying to break into a network to try to find security holes (identify possible entry points) in your own system, so they can be fixed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does anti-malware software do?

A

Detect and remove malware from a computer system.

17
Q

What is a firewall?

A

A barrier separating two networks. The barrier prevents unauthorised access to a network.