Save
...
Paper 1
Networks Security
Preventing Vulnerabilities
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Caylin Hindle
Visit profile
Cards (35)
What is the purpose of a penetration test?
To review
system security
for risks
View source
What is the main goal of ethical hacking?
To find and fix
security weaknesses
View source
What are the four main types of penetration tests?
Internal tests
External tests
Blind tests
Targeted tests
View source
What do internal penetration tests assess?
Damage potential
by internal
users
View source
What is the focus of external penetration tests?
Infiltration
attempts from outside
View source
What characterizes blind penetration tests?
No
inside information
is provided
View source
Who conducts targeted penetration tests?
IT department
and
penetration team
together
View source
What is the function of anti-malware software?
To
locate
and
delete malware
View source
How does anti-malware software identify malware?
By comparing files against a
database
View source
Why must anti-malware software be regularly updated?
New malware
forms
are
created
daily
View source
What are the roles of anti-malware software?
Checking incoming and outgoing emails
Scanning downloaded files
Scanning the hard drive for
viruses
View source
What does a firewall manage?
Incoming
and
outgoing
network traffic
View source
How does a firewall process data packets?
By checking
source
and
destination
addresses
View source
What are the roles of a firewall?
Blocking access to
insecure
websites
Blocking certain programs from internet access
Preventing
unauthorized
downloads
View source
What happens to unexpected data packets at a firewall?
They are
filtered
out and not accepted
View source
What is required for a secure password?
It must be matched with a
username
View source
What should a strong password contain?
A mix of
letters
,
numbers
, and
punctuation
View source
What is the minimum length for a secure password?
At least
8
characters
View source
Why should passwords be regularly changed?
To minimize
unauthorized
access risks
View source
What are the three types of access levels?
Read-Only
access
Read and Write
access
No access
View source
What does Read-Only access allow a user to do?
Only view a
file
without changing it
View source
What does Read and Write access allow a user to do?
Read and edit
the data in a file
View source
Why is it important to set access levels?
To prevent
unauthorized
data access
and changes
View source
What is encryption?
Scrambling data into an
unreadable
format
View source
What is the original data in encryption called?
Plaintext
View source
What is the scrambled data in encryption called?
Ciphertext
View source
What is used to convert plaintext to ciphertext?
An
encryption key
View source
How is ciphertext converted back to plaintext?
Using the correct
encryption key
View source
What is a physical security measure?
A lock on
server room
doors
View source
What do biometric devices require for access?
Input of a human
characteristic
View source
How is biometric data verified?
Checked against a
database
of data
View source
What are other forms of physical security?
Keycards
Security staff
CCTV
cameras
Alarms
View source
What is the exam board for the specification J277?
OCR
View source
What is the purpose of the "top of page" section?
To indicate the
document's title
and
level
View source
What is the significance of the "bottom of page" section?
It indicates
copyright information
View source