1.4 Network Security Flashcards

1
Q

What is malware?

A

Malware is a type of program that can replicate itself and cause a computer to malfunction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List different malware.

A

Virus, worms, ransomware, spyware, root kits, Trojan horses, and back doors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List some measures to prevent malware attacks.

A

Installing anti-virus software, backing-up a system in off-site mode, updating operating systems and browsers and avoiding downloads of email attachments from unknown senders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is phishing?

A

Phishing is a type of attack to obtain security-related information such as passwords by disguising as a trustworthy entity through electronic communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are phishing emails filtered?

A

Email service providers filter phishing emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Denial of Service (DoS) attack?

A

Denial of Service attacks prevent a user from accessing part of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In what ways do attackers intercept and steal data?

A

By using hijacking software and pretending to be the destination across the network. Also, by using packet sniffing software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does packet sniffing software do?

A

Packet sniffing software examines data packets in a certain route and by using a network switch an attacker manages to examine all the data packets at a certain IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can a user defend himself against brute-force attacks?

A

Using long passwords with lowercase, uppercase, numbers and special characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the steps involved in penetration testing?

A

Identifying a vulnerability
Setting up an attack
Carrying out the attack
Testing the ability of the system to recover any lost or corrupted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List some of the functions of a firewall.

A

Checks whether the incoming and outgoing data meet the set of requirements.
Prevent malware, hackers and DoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an incident response plan?

A

In case of a security failure, a plan is established to recover from it, which is called an incident response plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List some areas covered by network policies.

A

Acceptable use policy, archiving, passwords, email, web, remote access, wireless network, servers and incident response plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is ethical hacking?

A

Ethical hacking is the process of analysing the weakness in network and security vulnerabilities with organisation’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is gateway?

A

A hardware that acts as firewall is called gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How is a system protected from keyloggers?

A

Systems ask the user to enter only a certain characters of the password to protects the system from keyloggers.

16
Q

What is proxy server?

A

A proxy server is a server installed between user’s computer and web server, acts as a firewall.

17
Q

How does proxy server provide security?

A

Use of proxy server ensures that only safe websites are visited. Access to certain websites can be blocked. Proxy server hides the IP address of user to enhance security.

18
Q

List some security protocols.

A

Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

19
Q

What is hashing algorithm?

A

A hashing algorithm converts a text message into a string of hexadecimal characters.