Comp Flashcards
What is WAP
Wireless access point allows wireless devices to connect to wired networks using wi-fi
What is a switch
A switch is used to connect all devices to a network and a switch will send a message to its intented location in a network
What is router
A router is a networking device that forwards data packets between computer networks.
What is a modem used for
A modem is used to modulate the electrical signal
What are some ways to reduce the chance of cyber attack succeeding
Audit trail
Use secure operating system
Provide effective network security
WHat is white box penetration testing
White box penetration testing approach, also known as an assumed breach, clear box, or transparent box testing, is where the penetration tester has full access and complete knowledge of the target that is being tested and its features.
What is black box penetration testing
In a black box penetration test, no information is provided to the tester at all.
What is ethical hacking
Ethical hacking is when a person hacks into a system but doesn’t cause any harm.
3 ways to identify vulnerabilities
penetration testing
Ethical hacking
commercial analysis tool
What is a eavesdropping attack
Eavesdropping attack is when someone intercepts data being sent from one computer to another computer. Eavesdropping is just reading the data but not copying it or stealing it.
What is a unpatched software
It is basically a sofware that is very vurnerable to malware attacks because the person who made it has to see the weaknesses of his software by putting it on the internet.
What is shoulder surfing
Shouldering involves a attacker watching victim over their shoulder while they provide personal infomation (For example passcode for phone).
What is pharming
The term pharming refers to a user being sent a fake website that the user believes is real and the users are tricked into entering their personal info.
What is phishing
Phishing is a attack in which a victim recieves a message disguised to look like it is from a reputable source (for example Bank). THe message will contain a link when clicked will trick victim into giving personal information or initiate the installation of a malware.
What are the 6 types of cyberattacks
Phising
Pharming
Shoulder surfing
Unpatched software
USB device
Eavesdropping
Disadvantage of cloud storage
You are relying on third party stroage provider if company shuts down data may be lost.
Internet is required to access data
security risk
Advantage of cloud
You can change to amount of storage you need at anytime
Stored data can be accessed from anywhere
Cloud storage can back up data hourly or daily so data can be restored if there is hardware failure.
What is a firewall
A firewall is something that sits inbetween a trusted network (e.g. Home network) and a un-trusted network (e.g. Internet) and the firewall will attempt to prevent malicious traffic entering the network.
What is a runtime error
A runtime error is when a program encounters issues with some operations during runtime.
What is a logic error
A logic error is when a program does not do what it was intended to do
What is a syntax error
A syntax error is where a program statement does not obey the grammatical rules of the programming language.
What is a compiler
Translates a high-level program to machine code.
If a program contains a syntax error, a comprehensive list of all syntax errors is produced.
What are the 2 types of low-level language
Assembly language and Machine code
Advantage and disadvantage of Mesh
Advantage: Multiple path between devices
Disadvantage: Expensive, complicated to install