Preventing Vulnerabilities Flashcards

1
Q

What are user access rights?

A

They are set up by the network manager who will define groups and allocate specific permissions to those groups. People using the network will then be assigned to a group and all permissions related to that group will apply to them when they log in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 common access rights?

A

‘Read’, which is the ability to view and open the file or folder
‘Write’, which allows the file or folder to be modified
‘Execute’ which gives the user the right to execute or run an executable application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does having access rights improve security?

A

If there is virus or malware, it is limited to the areas that this user has access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the most common way of protecting a network?

A

Username and Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a password manager?

A

A software application designed to handle your passwords by automatically creating long, random passwords for your favourite sites and password protected files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a network policy?

A

A document that sets out the rules and procedures to help protect the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 3 typical policies in a network policy?

A

Acceptable use policy
Back-up policy
Recovery policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an ‘acceptable use policy’ document?

A

A ‘contract’ that each person signs before they are given access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What 6 things should the acceptable use policy contain?

A

Choosing secure passwords
Changing passwords regularly and not using the same one twice
Keeping passwords safe and not sharing them with anyone
Logging off a workstation when they are going to be absent
Not installing any software or downloading files
Not using USB sticks unless authorised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 4 advantages with a full backup?

A

It is a complete copy of all the data that needs to be backed up
Can be fast to recover from backup as everything is there in one place
Multiple full backups can be stored so as to be able to ‘roll back’ fairly quickly
It is simple to recover only certain folders and files if need be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 4 disadvantages with full backups?

A

Can take a long time
A full backup is at least as large as the original data storage used
Multiple full backups can require a large amount of storage and this is inefficient if only a small part of the data ever changes
The user may have changed their system configurations since the last backup - these altered settings may be lost after the backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are 4 advantages with incremental backups?

A

Fast compared to full backup as only changed files are backed up
Efficient in terms of the storage needs
Every version of a file is stored - very handy if you want to see what changes were made to it over time
Good backup software will allow the easy recovery of any stored version of the file and folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 4 disadvantages with incremental backups?

A

There needs to be at least one full backup made to start from
There should not be too many incremental backups before the next full one as this can make it difficult to get a complete restore done
May be inefficient storage
Need to be much more careful in matching the backup schedule with how people are using the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a disaster policy?

A

A policy in place to get back the network and data as quickly as possible, should a fire or flood occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 5 things stated in the disaster policy?

A

Who has responsibility for performing backups
The location of the backups - which are preferably stored off site
How often the Disaster Recovery Plan (DRP) needs to be tested to ensure that it is still valid
A list of the main suppliers of the hardware are so the network can be re-built
Any international standards that have been used in the current network setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an anti-virus?

A

An application designed to detect computer viruses

17
Q

How does an anti-virus work?

A

It has a database of virus ‘signatures’, and also looks out for typical virus behaviour such as modifying important system files

18
Q

What is an anti-malware?

A

An application that can detect and remove malware

19
Q

What is a firewall?

A

A ‘firewall’ sets the rules for how data packets can enter or leave the network

20
Q

What are firewalls in terms of software and hardware?

A

A hardware appliance or software running on the local computer

21
Q

What do firewalls help protect against?

A

Denial of Service attacks, and can prevent malware from leaking data back out of the network if it manages to get in

22
Q

What other rule does a firewall have?

A

Has rules in place to block access to certain IP addresses

23
Q

What is penetration testing?

A

A way of finding weaknesses in a network by hiring professional hackers to try and get into the network

24
Q

What do professional hackers have to sign when about to do a penetration test on a network?

A

A contract with the company that makes it very clear what they can and cannot do on the network

25
Q

What is encryption?

A

Process of scrambling a message or data in such a way that only the person (or computer) knowing the correct key can read

26
Q

What is a cipher?

A

The method used to encrypt the message

27
Q

Give an example of a cipher

A

AES-256

28
Q

What bit key does AES-256 use?

A

256 bit key

29
Q

What are network forensics?

A

Network forensics monitors the network in real time. System logs are also examined daily