Network Security Flashcards

1
Q

What is Malware

A

Any type of harmful program that seeks to damage or gain unauthorised access to the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe 3 characteristics of a virus

A

A virus can replicate itself, only activated when opened by a human and can change data/corrupt a system so then it no longer works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe 3 characteristics of a worm

A

A worm can replicate itself by finding weaknesses, does not need to be opened and can spread very quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is trojan

A

A harmful program that looks legitimate to trick users into installing it so then attackers have access to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe how spyware and keyloggers work

A

Both programs records a users activity (spyware is software, keylogger is input) to record passwords, usernames and credit card info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe how Ransomware works and why it is difficult to trace attackers who use it

A

It locks files on a system using encryption so then the user can no longer access them. They usually use bitcoin which makes it harder to trace them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SQL injection and how do attackers use it

A

SQL (structured query language) is a programming language for manipulating data in data bases and it can be used view and edit the contents of a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a DOS attack and what is it’s impact

A

A DOS (Denial of service) attack is when a computer repeatedly sends requests to a server to overload it and slow down the system temporarily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is DDOS attack different to DOS

A

Distributed denial of access is different because it uses a botnet of infected systems to overload a system. Botnot is a large group of devices controlled and used maliciously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe a brute-force attack

A

Attempting every possible combination in order from start to finish to gain access to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe social engineering

A

Posing as a trusted source to gain personal information on someone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe interception

A

Data packets on a network are intercepted and copied to a different location that the intended one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the purpose of penetration tests

A

To review a system’s security to find any risks or weaknesses and fix them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe internal tests

A

How much damage can possibly be done by somebody within the company with a registered account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe external testing

A

For white hat hackers to try and infiltrate the system from outside the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe blind tests

A

Done with no inside information, to stimulate what a real hacker would have to do to infiltrate the system

17
Q

Describe targeted tests

A

Conducted by a companys IT department and the penetration team cooperating together to find faults in the system

18
Q

Describe the purpose of antimalware software and it’s different roles

A

Locates and deletes malware on a system as it scans the files and compares the database to a known malware. Checks incoming and outgoing emails, checks downloaded files and scans harddrive

19
Q

Describe the purpose of a firewall and it’s roles

A

Manages ingoing and outgoing traffic where each data packet is processed whether it should be given access. It blocks access to insecure websites, blocks programs from accessing the internet and prevents users accessing certain files

20
Q

State 3 rules for a strong password

A

Variety of letters, numbers and special characters

21
Q

State 3 types of access levels

A

Read-only, read and write or no access

22
Q

Describe the purpose of encryption

A

The process of scrambling data into an unreadable format so attackers can not understand or intercept.