0Still learning
Know0
What is a brute-force attack?
A brute-force attack is when an attacker repeatedly tries multiple combinations of a user's password to gain unauthorised access to their accounts or devices.
Define the term DDoS attack.
A DDoS (Distributed Denial of Service) attack is a large scale, coordinated attack designed to slow down a server to the point of it becoming unusable.
What is data interception?
Data interception is when thieves or hackers compromise usernames, passwords, and other sensitive data by collecting data transferred on a network.
Enjoying Flashcards?
Tell us what you think
What is a brute-force attack?
A brute-force attack is when an attacker repeatedly tries multiple combinations of a user's password to gain unauthorised access to their accounts or devices.
Define the term DDoS attack.
A DDoS (Distributed Denial of Service) attack is a large scale, coordinated attack designed to slow down a server to the point of it becoming unusable.
What is data interception?
Data interception is when thieves or hackers compromise usernames, passwords, and other sensitive data by collecting data transferred on a network.
True or False?
Hacking always involves stealing data.
False.
Hacking can involve various malicious purposes, such as stealing data, installing malware, or disrupting operations.
What is malware?
Malware is any software created with malicious intent to cause harm to a computer system.
Define the term pharming.
Pharming is redirecting a user to a fake website when they type a legitimate website address, in order to trick them into entering sensitive information.
What is phishing?
Phishing is the process of sending fraudulent emails/SMS to a large number of people, claiming to be from a reputable company or trusted source, to gain access to their details.
What is social engineering?
Social engineering is exploiting weaknesses in a computer system by targeting the people that use or have access to them.
True or False?
A virus can replicate itself on a user's computer.
True.
A virus can replicate itself on a user's computer.
What is the main difference between a virus and a worm?
The main difference is that worms will spread to other drives and computers on the network, while viruses typically remain on a single computer.
What are access levels?
Access levels are permissions that ensure users of a network can access what they need and do not have access to information/resources they shouldn't.
Define anti-malware software.
Anti-malware software is a combination of different software to prevent computers from being susceptible to viruses and other malicious software.
What is authentication?
Authentication is the process of ensuring that a system is secure by asking the user to complete tasks to prove they are an authorised user of the system.
True or False?
Biometric authentication uses biological data for identification.
True.
Biometric authentication uses biological data for identification.
What is the purpose of automatic software updates?
Automatic software updates take away the need for a user to remember to keep software updated and reduce the risk of software flaws/vulnerabilities being targeted.
Define the term firewall.
A firewall is a security system that monitors incoming and outgoing network traffic and uses a set of rules to determine which traffic to allow.
What are privacy settings?
Privacy settings are controls used to manage the amount of personal information that is shared online.
What is a proxy server?
A proxy server is a server that acts as an intermediary between a user's device and the internet, hiding the user's IP address and location.
What does SSL stand for?
SSL stands for Secure Socket Layer.
True or False?
SSL is used to encrypt data transmitted over the internet.
True.
SSL is used to encrypt data transmitted over the internet.