1.4 network security

    Cards (59)

    • What is malware?
      Malware is any type of harmful program that seeks to damage or gain unauthorized access to your computer system.
    • What is the purpose of a penetration test?
      To review the system's security and find risks or weaknesses
    • How does a virus spread?
      A virus can replicate itself and spread by attaching to infected files.
    • What are the four main types of penetration tests?
      Internal, external, blind, and targeted tests
    • When is a virus activated?
      A virus is activated when opened by a human.
    • What is the focus of internal penetration tests?
      To assess damage by someone within the company with a registered account
    • What can happen once a virus is activated?
      Once activated, a virus can change data or corrupt a system.
    • What do external penetration tests aim to do?
      To allow white hat hackers to infiltrate a system from outside
    • What is the purpose of blind penetration tests?
      To simulate a real attacker without inside information
    • How does a worm differ from a virus in terms of spreading?
      A worm spreads by finding weaknesses in software and does not need human interaction.
    • What is a key characteristic of a worm?
      A worm can spread very quickly across a network once it has infiltrated it.
    • How are targeted penetration tests conducted?
      By the company's IT department and the penetration team working together
    • What is a trojan?
      A trojan is a harmful program that looks like legitimate software to trick users into installing it.
    • What does a trojan provide to an attacker?
      A trojan secretly gives the attacker backdoor access to the system.
    • What is the primary function of anti-malware software?
      To locate and delete malware on a computer system
    • How does anti-malware software identify malware?
      By scanning files and comparing them against a database of known malware
    • Do trojans self-replicate?
      No, trojans do not self-replicate or infect other files.
    • Why must anti-malware software be regularly updated?
      To protect against new forms of malware created daily
    • What is the main aim of spyware?
      The main aim of spyware is to record usernames, passwords, and credit card information.
    • What are the roles of anti-malware software?
      • Checking all incoming and outgoing emails and attachments
      • Checking files as they are downloaded
      • Scanning the hard drive for viruses and deleting them
    • How does a keylogger function?
      A keylogger secretly records the key presses of a user on a computer.
    • What is the main function of a firewall?
      To manage incoming and outgoing network traffic
    • What is the main aim of a keylogger?
      The main aim of a keylogger is to record usernames, passwords, and credit card information.
    • How does a firewall process data packets?
      By examining the source and destination address to determine access
    • How can keyloggers be installed?
      Keyloggers can be downloaded or plugged into the USB port.
    • What happens to unexpected data packets at a firewall?
      They are filtered out and not accepted to the network
    • What does ransomware do to files on a computer system?
      Ransomware locks files using encryption so that a user can no longer access them.
    • What are the roles of a firewall?
      • Blocking access to insecure/malicious websites
      • Blocking certain programs from accessing the internet
      • Blocking unexpected/unauthorized downloads
      • Preventing specific users from accessing certain files
    • What is required to minimize unauthorized access to a system?
      A secure password matched with a username
    • What does an attacker demand in a ransomware attack?
      An attacker demands money from the victim to decrypt (unlock) the data.
    • What characteristics should a strong password have?
      A mix of uppercase and lowercase letters, punctuation, and numbers
    • Why is it difficult to trace ransomware attackers?
      Attackers usually use digital currencies like bitcoin, which makes it hard to trace them.
    • What is SQL used for?
      SQL (Structured Query Language) is used for manipulating data in databases.
    • What is the minimum length recommended for a secure password?
      At least 8 characters
    • What is an SQL injection?
      An SQL injection is when a malicious SQL query is entered into a data input box on a website.
    • What are the types of user access levels?
      • 'Read-Only' access: Users can only view a file
      • 'Read and Write' access: Users can read and edit data
      • No access: Users cannot view or edit the file
    • What can an attacker do with an SQL injection?
      An attacker can use an SQL injection to view and edit the contents of a database or gain administrator privileges.
    • Why is it important to set access levels for files?
      To ensure only authorized users can view and change data
    • What is encryption?
      The process of scrambling data into an unreadable format
    • What is a DoS attack?
      A DoS (Denial of Service) attack is when a computer repeatedly sends requests to a server to overload the system.
    See similar decks