Save
...
Paper 1
1.4 Network Security
1.4.2 Identifying and Preventing Vulnerabilities
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Pav Bath
Visit profile
Cards (19)
What is the purpose of penetration testing?
To determine how
resilient
a network is against an attack
View source
Who typically conducts penetration testing?
Authorized users
or
external parties
who probe the network for weaknesses
View source
What does anti-malware software do?
Removes
viruses
and
spyware
from the system
View source
What are the main functions of anti-malware software?
Scans for and identifies malware
Compares data to a malware
database
Alerts users and requests action
Quarantines
or deletes malware
Stops the download of malware
View source
What is a major limitation of anti-malware software?
It is
reactive
and can only detect known
malware
View source
What do firewalls do?
They scan
incoming
and outgoing traffic
View source
What are the key functions of firewalls?
Scans
incoming
and outgoing traffic
Compares traffic to criteria
Blocks
unauthorized
traffic
View source
What do network policies define?
Acceptable use
of the network
View source
What are some components of an acceptable use policy?
Secure, hard-to-guess
passwords
Regular password changes
Restrictions on
unauthorized
equipment
Defined access levels for
sensitive data
Regular backups and
disaster recovery procedures
View source
How do user access levels contribute to network security?
They limit data and actions users can access, reducing
potential threats
View source
What are some examples of user access levels?
Limits on
software installation
Restrictions on accessing specific
network drives
Read/write
permissions
for files
View source
What is a common threat posed by users on a network?
Accidental or deliberate actions that compromise
security
View source
What are some countermeasures to user-related threats?
Not allowing external devices on the network
Blocking access to
insecure
websites
Restricting access to
USB ports
and email
View source
What is the purpose of passwords in network security?
To verify the
identity
of users accessing the network
View source
How can password strength be enforced?
By setting policies that require
complex passwords
View source
What is an example of a strong password?
“c0Mput!ng”
View source
What is the role of encryption in data security?
Uses an
algorithm
to scramble data
Turns text into
cipher text
Requires a
key
for encryption and decryption
Renders
intercepted
data unintelligible
View source
What are some physical security measures for networks?
Locks and keycard entry
Biometric
entry systems
Alarms and security teams
CCTV
surveillance
View source
What is a key aspect of physical security for networks?
Preventing
unauthorized
physical access
View source