1.4 network security Flashcards

1
Q

What is malware

A

Malicious software designed to hack a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus

A

Type of malware. Programs embedded in other files. Cause damage by deleting or modifying data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a worm

A

Type of malware. Similar to viruses but not hidden in other data. Often spread through emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Trojan horse

A

Type of malware. Pretends to be legitimate but is malware. Cannot spread by themselves so deceive users into installing them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spyware

A

Type of malware. Programs that monitor user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ransomware

A

Type of malware. Attempt to blackmail a user into making a payment to a hacker. Some types of ransomware do little but try to scare users into paying, while others go further - they encrypt documents and will not decrypt them until a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is phishing

A

Emails that try to trick users into giving away personal details. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is brute force

A

Where a program is used to find a password by trying all possible combinations of characters until the correct one is obtained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is denial of service

A

Where a computer (or many computers) is used to prevent a server from performing its tasks. This is done by bombarding the server over and over again with requests. Eventually the server is tied up trying to handle all the DOS requests, making it very difficult for it to respond to legitimate requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is data interception

A

Also known as man-in-the-middle attacks. Where data is intercepted during transmission. This is done using software called a packet sniffer, which examines data packets as they are sent around a network, or across the internet. The information gathered is sent back to a hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an SQL

A

Where SQL code is entered as a data input. Many databases use SQL code to interrogate the data and maintain the structure. SQL code can be inputted as data, which can cause errors or unintended operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is penetration testing

A

Testing networks for weaknesses to fix them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a firewall

A

Application that prevents unauthorised data to and from the network using a firewall policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is encryption

A

Files that have been altered using a secret code that are unreadable to unauthorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is anti malware software

A

Software that detects, removes and prevents malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are secure passwords

A

A secure password should be one that is not easy to guess, and that requires at least eight characters, including at least one uppercase letter, one number and one special character. This reduces the chances of someone easily working out what the password is.

17
Q

Network policies

A

A network manager should have an acceptable use policy which ensures:
- users have a secure, hard-to-guess password which meets specified conditions
- users change their password on a regular basis
- users cannot connect unauthorised equipment to the network, such as USB memory sticks, smartphones and tablets
- levels of access are given, which allow only authorised users to access sensitive data
- a regular backup procedure is in place
- a disaster recovery procedure exists in case of data loss
- regular penetration testing and forensic analysis
- regular maintenance including applying software upgrades and security patches to equipment
- preventing physical access to servers
maintaining a high level of security with up-to-date anti-virus software and firewalls

18
Q

What are user access levels

A

Determine the facilities a user has access to. Network managers should ensure users only have access to data they need