1.4 network security Flashcards

(19 cards)

1
Q

what is malware?

A

a malicious software designed to hack a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are 5 types of malware?

A

viruses, worms, trojans, spyware, ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a virus?

A

programs embedded in other files. They replicate themselves and become part of other programs. Viruses often cause damage by deleting or modifying data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a worm?

A

self-replicates and spreads across a computer network without any human intervention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a trojan?

A

pretends to be legitimate but are malware, often disguised as email attachments. Trojans cant spread by themselves instead they deceive a user into installing the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is spyware?

A

monitors user activities (such as websites visited, usernames and passwords used) and send the information back to a hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is ransomware?

A

blackmails a user into making a payment to a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is brute force attack?

A

trys to find a password by trying all possible combinations until the correct one is obtained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is DOS attack?

A

bombards the server over and over again with requests so the server is tied up trying to handle all the DOS requests, so it cant respond to legitimate requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is data interception?

A

data is intercepted during transmission using a packet sniffer, which examines data packets as they are sent around a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is SQL injection?

A

adding malicious sql code into a web form in order to view, modify, delete database records or to gain unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is social engineering?

A

when a scammer tricks the user into providing information such as username and passwords. One possible way is to use phishing. The phishing email pretends to be a genuine message and tries to deceive the user into following a link to a website that looks like the real company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is penetration testing?

A

systems are tested for vulnerabilities to reveal any weaknesses in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is anti-malware software?

A

detects, prevents and removes malware on a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a firewall?

A

prevents unauthorised connections to and from the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is user access levels?

A

the permissions given to a user to access facilities on a computer

18
Q

what is encryption?

A

files that have been altered using a secret code and are unreadable to unauthorised parties