Save
Computer Science
Communication and Networking
Internet Security
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
willow
Visit profile
Cards (26)
What is the purpose of a firewall?
To sit between
trusted
and
untrusted
networks
View source
What are the two types of inspection performed by firewalls?
Stateless
and
stateful
inspections
View source
How does stateless inspection work?
Uses a list of
IPs
,
ports
, and
protocols
View source
What is stateful inspection?
Tracks open
conversations
in a connection
table
View source
Why is stateful inspection generally more effective than stateless inspection?
It checks
packet
payloads
for suspicious activity
View source
What is the role of a proxy server?
Provides
privacy
and
web
filtering
features
View source
What is symmetric encryption?
Uses the same
key
for
encryption
and decryption
View source
What is an example of symmetric encryption?
Diffie-Hellman
Key
Exchange
View source
How does asymmetric encryption work?
Uses a pair of
public
and
private
keys
View source
What is the advantage of asymmetric encryption over symmetric encryption?
Provides higher
confidentiality
and
authentication
View source
What is a digital signature used for?
To
authenticate
the sender and guarantee
integrity
View source
How is a digital signature created?
By
encrypting
a
hash
of the message with the sender's
private
key
View source
What is a digital certificate?
An electronic document verifying a
sender's
identity
View source
What information does a digital certificate include?
Serial number
,
expiry date
,
holder's name
,
public key
View source
What is malware?
Malicious
software
designed to harm devices
View source
What is a virus?
Self-replicating
software that attaches to
programs
View source
How do worms spread?
They replicate
independently
without a
host
program
View source
What is a Trojan?
A
malicious
program disguised as
legitimate
software
View source
What does spyware do?
Gathers information on a user without
consent
View source
What is ransomware?
Locks
files and demands a
fee
for access
View source
What is the purpose of anti-malware software?
To
detect
,
quarantine
, and remove malware
View source
How can code quality help protect against malware?
Reduces bugs that malware can
exploit
View source
What is the purpose of code reviews?
To
test
and ensure code
quality
regularly
View source
What is patching in software?
Updates designed to fix
software
vulnerabilities
View source
What are the types of malware and their characteristics?
Virus:
Self-replicating
, attaches to programs
Worm
: Replicates independently, spreads without a host
Trojan: Disguised as
legitimate
software, malicious actions
Spyware
: Gathers user information secretly
Ransomware
: Locks files, demands payment for access
View source
What measures can be taken to protect against malware threats?
Use
anti-malware/anti-virus software
Ensure high
code quality
Conduct regular code reviews
Apply software
patches for vulnerabilities
View source