Preventing Vulnerabilities

Cards (35)

  • What is the purpose of a penetration test?
    To review system security for risks
  • What is the main goal of ethical hacking?
    To find and fix security weaknesses
  • What are the four main types of penetration tests?
    • Internal tests
    • External tests
    • Blind tests
    • Targeted tests
  • What do internal penetration tests assess?
    Damage potential by internal users
  • What is the focus of external penetration tests?
    Infiltration attempts from outside
  • What characterizes blind penetration tests?
    No inside information is provided
  • Who conducts targeted penetration tests?
    IT department and penetration team together
  • What is the function of anti-malware software?
    To locate and delete malware
  • How does anti-malware software identify malware?
    By comparing files against a database
  • Why must anti-malware software be regularly updated?
    New malware forms are created daily
  • What are the roles of anti-malware software?
    • Checking incoming and outgoing emails
    • Scanning downloaded files
    • Scanning the hard drive for viruses
  • What does a firewall manage?
    Incoming and outgoing network traffic
  • How does a firewall process data packets?
    By checking source and destination addresses
  • What are the roles of a firewall?
    • Blocking access to insecure websites
    • Blocking certain programs from internet access
    • Preventing unauthorized downloads
  • What happens to unexpected data packets at a firewall?
    They are filtered out and not accepted
  • What is required for a secure password?
    It must be matched with a username
  • What should a strong password contain?
    A mix of letters, numbers, and punctuation
  • What is the minimum length for a secure password?
    At least 8 characters
  • Why should passwords be regularly changed?
    To minimize unauthorized access risks
  • What are the three types of access levels?
    • Read-Only access
    • Read and Write access
    • No access
  • What does Read-Only access allow a user to do?
    Only view a file without changing it
  • What does Read and Write access allow a user to do?
    Read and edit the data in a file
  • Why is it important to set access levels?
    To prevent unauthorized data access and changes
  • What is encryption?
    Scrambling data into an unreadable format
  • What is the original data in encryption called?
    Plaintext
  • What is the scrambled data in encryption called?
    Ciphertext
  • What is used to convert plaintext to ciphertext?
    An encryption key
  • How is ciphertext converted back to plaintext?
    Using the correct encryption key
  • What is a physical security measure?
    A lock on server room doors
  • What do biometric devices require for access?
    Input of a human characteristic
  • How is biometric data verified?
    Checked against a database of data
  • What are other forms of physical security?
    • Keycards
    • Security staff
    • CCTV cameras
    • Alarms
  • What is the exam board for the specification J277?
    OCR
  • What is the purpose of the "top of page" section?
    To indicate the document's title and level
  • What is the significance of the "bottom of page" section?
    It indicates copyright information