Internet Security Flashcards

1
Q

Why do we need network security?

A

To prevent unauthorised access to our electronic devices and to protect our data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the role of a firewall?

A

A firewall prevents unauthorised access to a network and is the first line of defence for a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does static packet filtering involve?

A

Monitoring and inspecting incoming packets, checking packet headers including source and destination IP addresses, ports, and protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between static packet filtering and stateful inspection?

A

Static packet filtering examines only the header, while stateful inspection monitors both outgoing and incoming packets and considers the connection’s state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a proxy server?

A

A server that routes traffic between the LAN and the internet, hiding the IP address of devices on the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of encryption?

A

To garble sensitive data so that it is unreadable to anyone without the key if intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is symmetric encryption?

A

A form of encryption where both the sender and receiver use the same key to encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In asymmetric encryption, what is used to encrypt and decrypt data?

A

A different key is used for encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a digital signature?

A

A method of verifying that a message has been sent from the correct source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a digital certificate?

A

A verification tool issued by certification authorities containing information about the owner, the public key, and the digital signature of the issuing body.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is malware?

A

Malicious software designed to damage, disrupt, or take control of computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Trojan software?

A

Malware that pretends to be legitimate software to gain access to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do computer viruses replicate?

A

They replicate themselves and can transfer from one computer to another, often activated by user actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What distinguishes worms from viruses?

A

Worms spread automatically without human intervention, while viruses require user activation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is SQL injection?

A

A method of hacking into databases by entering malicious input to access or modify data without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is buffer overflow?

A

A method where a hacker overwrites memory locations to place malware.

17
Q

What is the function of antivirus software?

A

To detect, quarantine, and remove known malware from a computer system.

18
Q

What does quarantine mean in the context of antivirus software?

A

Isolating affected files so they cannot infect the computer system.

19
Q

Why is it important to regularly update antivirus software?

A

To keep up with new viruses that are continuously being developed.

20
Q

Fill in the blank: A firewall acts as the _______ line of defence for a network.

21
Q

True or False: In symmetric encryption, different keys are used for encryption and decryption.

22
Q

Fill in the blank: _______ is short for malicious software.