|
|
Created by Peace Umudjoro
almost 6 years ago
|
|
| Question | Answer |
| Which type of threat is a technique that tries all combinations of characters to try to crack a password? | Brute force is a technique that tries all combinations of characters to try to crack a password. Phishing uses emails to try to trick users into giving away personal details. |
| Which of the following are forms of network attack? | Forms of network attack include active, passive and external. |
| Which type of threat uses emails to try to trick users into giving away personal details? | Phishing uses emails to try to trick users into giving away personal details. |
| Which preventative measure probes for weaknesses in a network? | Penetration testing probes for weaknesses in a network. Network policies determine what a user should and should not do on a network. |
| Which of the following are types of malware? | Worms, Trojans and ransomware are all types of malware. A hacker is a user who attempts to gain unauthorised access to a network or data. |
| Which preventative measure monitors traffic on a network? | Network forensics is a preventative measure that monitors traffic on a network. Network policies determine what a user should and should not do on a network. |
| Which of the following tools stops unauthorised traffic from entering and leaving a network? | A firewall is a tool that stops unauthorised traffic from entering and leaving a network. Anti-malware detects and removes malware. |
| Which of the following is a threat which may cause a database to give unintended results? | An SQL injection is a threat which may cause a database to give unintended results. |
| Which type of threat attempts to force a server offline by bombarding it with requests? | A denial of service (DOS) attack attempts to force a server offline by bombarding it with requests. |
| Which type of threat attempts to blackmail a user into making a payment to a hacker? | Ransomware attempts to blackmail a user into making a payment to a hacker. A Trojan is a program that pretends to be a legitimate program but is really malware. |
| What is the purpose of a firewall? | A firewall blocks unauthorised connections to and from a network. Anti-virus software detects and removes viruses. |
| What is the purpose of a username and password? | The username identifies who the user is. The password verifies that they are who they claim to be. |
| What makes a secure password? | A secure password should be a mixture of upper-case and lower-case letters, numbers and characters. |
| What is encryption? | Encryption disguises data so that it can't be understood. |
| Why are access levels useful? | Access levels control the level of access a user has to the network, including the ability to access files and download and install software. Restricting users' access to sensitive parts of the network can reduce the likelihood that a hacker or virus might be able to cause damage. |
| How do you know if a website is secure? | You know if a website is secure because its prefix is HTTPS. |
| Which of the following are types of malicious software? | Viruses, worms, zombies, trojans and spybots are types of malware. |
| What is the purpose of anti-virus software? | Anti-virus software detects and removes viruses from computers. |
| What is an archive? | An archive is a copy of old data that is not needed a present, but may be needed in future. It is stored safely away from the network. |
| Why do organisations have network policies? | A network policy forms an agreement between the organisation and its users on acceptable usage of the network. |
| Malware | A program that is designed to cause harm of some form to a computer or network. Examples of this include viruses, worms and trojans. |
| Phishing | These are emails that pretend as if their of a legitimate source when in fact they are frauds that just want to steal your information. They'll pretend to be someone their not. Their aim is to steal money, identities, login details and personal information. |
| Brute Force | This is a a forceful attempt of guessing the users password. They will guess a number of letters, numbers and symbols until they find the right password. They could use a dictionary of commonly used password or try every possible combination of passwords. |
Want to create your own Flashcards for free with GoConqr? Learn more.