Save
Computing
Computing 1
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
f
Visit profile
Cards (19)
What is
penetration
testing?
It is the practice of deliberately trying to find
security holes
in your own systems.
View source
What is the goal of penetration testing?
The goal is to identify targets of potential attacks and possible
entry
points.
View source
What types of malware can anti-malware software detect?
Viruses,
worms
, trojans, and
spyware.
View source
What happens when a new malware is detected by anti-malware software?
It is sent to the
anti-virus
company for verification and
signature
creation.
View source
Why is it harder to create a signature for some viruses?
Because viruses can
morph
to avoid
detection.
View source
What is encryption used for?
To secure data so that it cannot be read without the encryption key.
View source
How are passwords stored by websites?
They are almost always stored in an
encrypted
form.
View source
How can you tell if a website is encrypting communication?
By checking if the website uses
HTTPS.
View source
What does HTTPS stand for?
Secure HyperText Transfer Protocol.
View source
What is a packet filter in firewalls?
It checks
packets
of
information
to see where they are coming from and going to.
View source
What can firewalls prevent?
They can prevent
attackers
from gaining access to
computers
on a network.
View source
How do firewalls block malicious computers?
By filtering
packets
from certain
IP
addresses.
View source
What is a
password
policy?
It ensures that chosen
passwords conform
to
specific parameters.
View source
What features might a password policy include?
Minimum length, inclusion of
lowercase
and uppercase letters, and
symbols.
View source
Is "Pa55w*rd" a good password according to common policies?
Yes, it meets the criteria of
minimum length
and
character variety.
View source
What is physical security?
It is where hardware, software, and networks are protected by physical methods.
View source
What are some methods of physical security?
CCTV
, intruder alarms, locks,
fences
, and security guards.
View source
What are the threats and protections in digital systems?
Threats:
Viruses
Worms
Trojans
Ransomware
Social engineering
Protections:
Anti-malware
Encryption
Firewalls
Penetration testing
Physical security
User access levels
View source
What is the purpose of user access levels?
To set
access
rights on
disks
, folders, and individual files.
View source