1.4 Flashcards

(27 cards)

1
Q

What is malware?

A

An umbrella term for a variety of forms of hostile or intrusive software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three forms of malware.

A

Computer viruses, trojans and spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a computer virus?

A

Malware that attaches itself to a legitimate program or file and spreads when the infected file is opened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a trojan?

A

A malicious program that disguises itself as legitimate software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spyware?

A

Malware that secretly gathers information about a user’s activity, such as keystrokes, and sends it to the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is social engineering?

A

Techniques used to manipulate people into giving away confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is phishing?

A

Sending a communication that looks genuine, containing a link used to fraudulently obtain personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are brute-force attacks normally conducted?

A

Using automated software that quickly tests thousands of possible username and password combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of brute-force attacks?

A

To break into user accounts or systems by guessing login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How are denial of service attacks normally conducted?

A

By sending a massive number of requests to a server in a short space of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of denial of service attacks?

A

To overwhelm a website or online service, making it slow or inaccessible for real users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of networks are particularly vulnerable to data interception and theft?

A

Unsecured networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does SQL injection work?

A

Malicious SQL code is entered into website input fields; if input is not checked, the code is run by the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is penetration testing?

A

Simulated attacks used to find vulnerabilities before real attackers do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does penetration testing prevent?

A

Helps prevent SQL injection, brute‑force attacks, and data interception by identifying weaknesses that can be fixed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is anti-malware software?

A

Software that scans for, detects and removes malware by comparing files to a known database.

17
Q

What does anti-malware software prevent?

A

Helps prevent malware infections such as viruses, trojans, spyware and ransomware.

18
Q

What is a firewall?

A

Monitors incoming and outgoing traffic and blocks data that does not meet security rules.

19
Q

What does a firewall prevent?

A

Can block denial of service attacks and malware from the internet.

20
Q

What are user access levels?

A

Restrictions on what each user can view or change in a system, based on their role.

21
Q

What do user access levels prevent?

A

Help prevent misuse of data, insider threats and damage from low‑level compromised accounts.

22
Q

What is the purpose of a password?

A

Protects accounts by making it harder for attackers to log in without authorisation.

23
Q

What do secure passwords help prevent?

A

Limit brute-force attacks and unauthorised access.

24
Q

What is encryption?

A

A process that turns data into unreadable code unless decrypted with the correct key.

25
What does encryption prevent?
Protects against data interception and theft during transmission or if devices are stolen.
26
Name two physical security measures.
Locks on doors; CCTV.
27
What does physical security prevent?
Theft, hardware tampering and unauthorised physical access.