security and data management Flashcards

(27 cards)

1
Q

What is malware

A

Malware is a type of program that can replicate itself and cause a computer to malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List different malware

A

Virus, worms, ransomware, spyware, root kits, Trojan horses, and back doors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List some measures to prevent malware attacks

A

Installing anti-virus software, backing-up a system in off-site mode, updating operating systems and browsers and avoiding downloads of email attachments from unknown senders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is phishing

A

Phishing is a type of attack to obtain security-related information such as passwords by disguising as a trustworthy entity through electronic communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are phishing emails filtered

A

Email service providers filter phishing emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Denial of Service (DoS) attack

A

Denial of Service attacks prevent a user from accessing part of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In what ways do attackers intercept and steal data

A

By using hijacking software and pretending to be the destination across the network. Also, by using packet sniffing software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does packet sniffing software do

A

Packet sniffing software examines data packets in a certain route and by using a network switch an attacker manages to examine all the data packets at a certain IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can a user defend himself against brute-force attacks

A

Using long passwords with lowercase, uppercase, numbers and special characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the steps involved in penetration testing

A

Identifying a vulnerability,
Setting up an attack,
Carrying out the attack,
Testing the ability of the system to recover any lost or corrupted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List some of the functions of a firewall

A

Checks whether the incoming and outgoing data meet the set of requirements,
Prevent malware, hackers and DoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a firewall do when any data moving in or out of a network does not meet the requirements of network manager

A

A warning is issued and the data is blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List some areas covered by network policies

A

Acceptable use policy, archiving, passwords, email, web, remote access, wireless network, servers and incident response plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an incident response plan

A

In case of a security failure, a plan is established to recover from it, which is called an incident response plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the functions of an archiving policy

A

It decides the location where the data has to be moved, how it should be moved and how to get it back when required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is compression used for

A

To reduce the size of the files and to reduce the download time of image, audio and video from the Internet

17
Q

What are the two types of compression

A

Lossless compression and lossy compression

18
Q

What is lossless compression

A

When the file is compressed, the quality of the image remains the same and the file can be reconstructed to its original form

19
Q

What is lossy compression

A

When a file is compressed, the unnecessary bits of information are removed permanently

20
Q

What are the file formats for images

A

PNG, JPEG and GIF

21
Q

Which file format is used to store animated graphics

22
Q

What is an MPEG

A

MPEG (Moving Pictures Experts Group) is a standard to encode audio-video files that uses lossy compression technique

23
Q

What is the file format for DVD movies

24
Q

What attributes of a video file are affected due to compression

A

Compression reduces the resolution, dimensions and bit rate

25
What are codecs
Codecs are programs that encode or decode an audio, image or video file
26
What are compression codecs
Codecs that are aimed at reducing the size of a file without affecting its quality
27
What is run length encoding
Run length encoding (RLE) is a compression algorithm that converts the consecutive similar values into a code