Save
computer science
cs paper 1
1.4 network security
Save
Share
Learn
Content
Leaderboard
Learn
Created by
anisah
Visit profile
Cards (59)
What is malware?
Malware is any type of
harmful
program that seeks to damage or gain
unauthorized
access to your computer system.
View source
What is the purpose of a penetration test?
To review the
system's security
and find risks or weaknesses
View source
How does a virus spread?
A virus can
replicate
itself and spread by attaching to
infected
files.
View source
What are the four main types of penetration tests?
Internal
,
external
,
blind
, and
targeted
tests
View source
When is a virus activated?
A
virus
is
activated
when
opened
by a
human.
View source
What is the focus of internal penetration tests?
To assess
damage
by someone within the company with a registered
account
View source
What can happen once a virus is activated?
Once activated, a virus can change data or
corrupt
a system.
View source
What do external penetration tests aim to do?
To allow
white hat hackers
to infiltrate a system from outside
View source
What is the purpose of blind penetration tests?
To simulate a
real attacker
without
inside information
View source
How does a worm differ from a virus in terms of spreading?
A worm spreads by finding
weaknesses
in software and does not need human interaction.
View source
What is a key characteristic of a worm?
A worm can spread very quickly across a
network
once it has infiltrated it.
View source
How are targeted penetration tests conducted?
By the company's
IT department
and the penetration team working together
View source
What is a trojan?
A trojan is a harmful program that looks like
legitimate
software to trick users into installing it.
View source
What does a trojan provide to an attacker?
A trojan secretly gives the attacker
backdoor
access to the system.
View source
What is the primary function of anti-malware software?
To locate and delete malware on a
computer system
View source
How does anti-malware software identify malware?
By scanning files and comparing them against a
database
of known malware
View source
Do trojans self-replicate?
No, trojans do not self-replicate or
infect
other files.
View source
Why must anti-malware software be regularly updated?
To protect against new forms of malware created
daily
View source
What is the main aim of spyware?
The main aim of spyware is to
record
usernames
,
passwords
, and
credit card
information.
View source
What are the roles of anti-malware software?
Checking all
incoming
and
outgoing
emails and attachments
Checking files as they are downloaded
Scanning the hard drive for
viruses
and deleting them
View source
How does a keylogger function?
A keylogger secretly records the
key presses
of a user on a computer.
View source
What is the main function of a firewall?
To manage
incoming
and outgoing
network traffic
View source
What is the main aim of a keylogger?
The main aim of a keylogger is to
record
usernames
,
passwords
, and
credit card
information.
View source
How does a firewall process data packets?
By examining the
source
and
destination address
to determine access
View source
How can keyloggers be installed?
Keyloggers can be
downloaded
or plugged into the
USB
port.
View source
What happens to unexpected data packets at a firewall?
They are
filtered
out and not accepted to the network
View source
What does ransomware do to files on a computer system?
Ransomware locks files using
encryption
so that a user can no longer access them.
View source
What are the roles of a firewall?
Blocking access to
insecure
/
malicious
websites
Blocking certain programs from accessing the internet
Blocking unexpected/unauthorized downloads
Preventing specific users from accessing certain files
View source
What is required to minimize unauthorized access to a system?
A secure
password
matched with a username
View source
What does an attacker demand in a ransomware attack?
An attacker demands money from the
victim
to
decrypt
(unlock) the data.
View source
What characteristics should a strong password have?
A mix of
uppercase
and
lowercase
letters,
punctuation
, and numbers
View source
Why is it difficult to trace ransomware attackers?
Attackers usually use digital currencies like
bitcoin
, which makes it hard to trace them.
View source
What is SQL used for?
SQL (
Structured Query Language
) is used for manipulating data in databases.
View source
What is the minimum length recommended for a secure password?
At least
8
characters
View source
What is an SQL injection?
An SQL injection is when a
malicious
SQL query is entered into a data input box on a website.
View source
What are the types of user access levels?
'Read-Only'
access: Users can only view a file
'Read and Write'
access: Users can read and edit data
No access
: Users cannot view or edit the file
View source
What can an attacker do with an SQL injection?
An attacker can use an SQL injection to view and edit the contents of a
database
or gain
administrator
privileges.
View source
Why is it important to set access levels for files?
To ensure only
authorized
users can
view
and change data
View source
What is encryption?
The process of scrambling data into an
unreadable
format
View source
What is a DoS attack?
A DoS (
Denial of Service
) attack is when a computer repeatedly sends
requests
to a
server
to overload the system.
View source
See all 59 cards