1.4 – Network security Flashcards

1
Q

what is an acceptable use policy

A

a document stipulating constraints and practices that a user must agree to for access to a corporate network, the internet or other resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is an AUP used for

A

prevent users from accessing or confidential data and having unauthorised use of that data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is penetration testing

A

where a company pays a hacker to hack there website/database
it is used to find weak points in a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is network forensics

A

involves monitoring the traffic on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is malware

A

software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a virus

A

is intended to do harm. It can not spread without human assistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a trojan horse

A

a virus that misleads users or its true intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is a worm virus

A

computer program that replicates itself in order to spread to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is antivirus

A

a software which scans each file for viruses, when it finds one it quarantines it to stop it spreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a DDOS

A

multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
When a computer re-quests data from a web page over and over

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a brute force attack

A

attacker submitting many passwords or passphrases with the hope of eventually guessing correctly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how to prevent a BFA

A

lock out accounts after a defined number of incorrect password attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is data interception

A

a specific type of data theft, referring to information that is captured during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how to prevent data interception

A

VPN
avoid suspicious links
encryption
cameras
locks
alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is social enjineering

A

the person is the main weak point in the attack and all techniques are aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how to identify a phising email

A

Poor grammar and spelling errors.
An unfamiliar greeting or salutation.
Requests for login credentials, payment information or sensitive data.
Offers that are too good to be true.

17
Q

how to protect against malware

A

firewall
frequent updates
antivirus
encryption

18
Q
A