1.4 network security

Cards (59)

  • What is malware?
    Malware is any type of harmful program that seeks to damage or gain unauthorized access to your computer system.
  • What is the purpose of a penetration test?
    To review the system's security and find risks or weaknesses
  • How does a virus spread?
    A virus can replicate itself and spread by attaching to infected files.
  • What are the four main types of penetration tests?
    Internal, external, blind, and targeted tests
  • When is a virus activated?
    A virus is activated when opened by a human.
  • What is the focus of internal penetration tests?
    To assess damage by someone within the company with a registered account
  • What can happen once a virus is activated?
    Once activated, a virus can change data or corrupt a system.
  • What do external penetration tests aim to do?
    To allow white hat hackers to infiltrate a system from outside
  • What is the purpose of blind penetration tests?
    To simulate a real attacker without inside information
  • How does a worm differ from a virus in terms of spreading?
    A worm spreads by finding weaknesses in software and does not need human interaction.
  • What is a key characteristic of a worm?
    A worm can spread very quickly across a network once it has infiltrated it.
  • How are targeted penetration tests conducted?
    By the company's IT department and the penetration team working together
  • What is a trojan?
    A trojan is a harmful program that looks like legitimate software to trick users into installing it.
  • What does a trojan provide to an attacker?
    A trojan secretly gives the attacker backdoor access to the system.
  • What is the primary function of anti-malware software?
    To locate and delete malware on a computer system
  • How does anti-malware software identify malware?
    By scanning files and comparing them against a database of known malware
  • Do trojans self-replicate?
    No, trojans do not self-replicate or infect other files.
  • Why must anti-malware software be regularly updated?
    To protect against new forms of malware created daily
  • What is the main aim of spyware?
    The main aim of spyware is to record usernames, passwords, and credit card information.
  • What are the roles of anti-malware software?
    • Checking all incoming and outgoing emails and attachments
    • Checking files as they are downloaded
    • Scanning the hard drive for viruses and deleting them
  • How does a keylogger function?
    A keylogger secretly records the key presses of a user on a computer.
  • What is the main function of a firewall?
    To manage incoming and outgoing network traffic
  • What is the main aim of a keylogger?
    The main aim of a keylogger is to record usernames, passwords, and credit card information.
  • How does a firewall process data packets?
    By examining the source and destination address to determine access
  • How can keyloggers be installed?
    Keyloggers can be downloaded or plugged into the USB port.
  • What happens to unexpected data packets at a firewall?
    They are filtered out and not accepted to the network
  • What does ransomware do to files on a computer system?
    Ransomware locks files using encryption so that a user can no longer access them.
  • What are the roles of a firewall?
    • Blocking access to insecure/malicious websites
    • Blocking certain programs from accessing the internet
    • Blocking unexpected/unauthorized downloads
    • Preventing specific users from accessing certain files
  • What is required to minimize unauthorized access to a system?
    A secure password matched with a username
  • What does an attacker demand in a ransomware attack?
    An attacker demands money from the victim to decrypt (unlock) the data.
  • What characteristics should a strong password have?
    A mix of uppercase and lowercase letters, punctuation, and numbers
  • Why is it difficult to trace ransomware attackers?
    Attackers usually use digital currencies like bitcoin, which makes it hard to trace them.
  • What is SQL used for?
    SQL (Structured Query Language) is used for manipulating data in databases.
  • What is the minimum length recommended for a secure password?
    At least 8 characters
  • What is an SQL injection?
    An SQL injection is when a malicious SQL query is entered into a data input box on a website.
  • What are the types of user access levels?
    • 'Read-Only' access: Users can only view a file
    • 'Read and Write' access: Users can read and edit data
    • No access: Users cannot view or edit the file
  • What can an attacker do with an SQL injection?
    An attacker can use an SQL injection to view and edit the contents of a database or gain administrator privileges.
  • Why is it important to set access levels for files?
    To ensure only authorized users can view and change data
  • What is encryption?
    The process of scrambling data into an unreadable format
  • What is a DoS attack?
    A DoS (Denial of Service) attack is when a computer repeatedly sends requests to a server to overload the system.