1.6 System Security Flashcards

1
Q

What is a Passive attack?

A

Network traffic is monitored and then data is intercepeted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can you prevent a passive attack?

A

Encryption can encrypt the intercepted data and the unauthorised user cannot access it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Active attack?

A

Someone deliberately attacks a network with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can you prevent an Active attack?

A

Use an firewall and an antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Insider attack?

A

Someone with network access abuses this to steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you prevent an Insider attack?

A

User access levels to control how much data people can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Brute force attack?

A

When an user cracks a password using trial and error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you prevent a Brute Force attack?

A

Locking accounts after failed attempts after a certain number of times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is DDOS attack?

A

When a network is flooded with useless data so it crashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you prevent a DDOS attack?

A

A firewall can prevent it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SQL injection?

A

SQL commands are typed on a website database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you prevent a SQL injection?

A

Having strong validation on all input boxes?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Phishing?

A

Emails with links that trick people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you prevent Phishing?

A

Looking for signs that an email is not from a real company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Social engineering?

A

When a person manipulates someone into handing information?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you prevent social engineering?

A

Policies and rules for staff about handing over data

17
Q

What is Malware?

A

Malicious software intended to cause harm

18
Q

What is penetration testing?

A

Organizations employ professionals to try and hack their networks so that they can find areas of weakness

19
Q

What are User Access Levels?

A

Different employees have different levels of access to programs websites and data

20
Q

What is Encryption?

A

When data is scrambled and can only be decrypted with a specific key

21
Q

What is Network Forensics?

A

Data packets are captured as they enter the network and are analysed

22
Q

What are Network Policies?

A

Policies are used to reduce the risks on networks

23
Q

What is a virus?

A

Programs hidden within other programs, replicate themselves

Cause damage by deleting or modifying data

24
Q

What are worms?

A

Copy themselves without the user doing anything

They are usually spread through emails

25
What are Trojans?
Programs which pretend to be legitimate but in reality are malware Trojans cannot spread by themselves Deceive a user into installing the program
26
What is Ransomware?
Programs that attempt to blackmail a user into making a payment to a hacker or unauthorized group
27
What is an external attack?
Where someone outside of an organization attempts to hack into a network?
28
What is the cipher text?
Encrypted text
29
What is plain text?
Data that has not been encrypted is called plain text
30
What is Asymmetric encryption?
An algorithm that generates two keys - a public key and a private key
31
What is the purpose of the public key?
To encrypt a message