1. Storing usernames and passwords as unencrypted text is secure
and would be suitable for a real-world application
2. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor
3. A DoS or DDoS attack is analogous to ?
4. Denial-of-service attacks are characterized by an explicit attempt by attackers to prevent legitimate use of a service. They could be motivated by:
5. MAC address filtering allows you to define a list of devices and only allow those devices on your Wi-Fi network.
6. In computer networking, Media Access Control MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby
7. An example of social engineering is the use of a trojan horse.
8. Malware distribution is legal in most countries and helpful in preventing security breaches.
9. Viruses are engineered pieces of code that cause great destruction. They do not need to attach themselves to a program unlike worms.
10. Worms are a type of social engineering and are designed to mislead and attach to other programs.
11. Trojan horses are designed to access a computer by misleading users of its? intent by prompting to download a program
12. Viruses cannot affect a user's hard drive, so files saved on the hard disk are always safe.
13. Sending requests to a single server using hijacked machines is commonly referred to as Phishing
14. Social engineering, phishing and worms are all examples of viruses.
15. Data travels across networks in __________-- and these ________are vulnerable to interception.
16. The download and installation of 'patches' can protect organisations against attacks like SQL injections.
17. An SQL injection can grant an attacker access to a _____________ where they can manipulate or even steal all the data.
18. SQL injections typically cause unauthorised access to databases, servers, mainframes as well as directly to the PCs CPU.
19. Netwok forensics primarily involves the examination of comptuer data that is stored in archives.
20. What is needed to decrypt an encrypted file?
21. Many failures in security can be attributed to human weakness, misunderstanding, misinformation, misdirection, or failure to grasp the importance of prescribed processes and procedures.
22. A distributed denial-of-service (DDoS) is a ____________ where the perpetrator uses more than one unique IP address, often thousands of them
23. SQL injection usually occurs when you ask a user for input, like their username/userid, and instead of a name/id, the user gives you ___________
24. One way of protecting a website from SQL injection is to use what is called 'SQL parameters'
25. A ______________is a network security system that monitors and controls over all your incoming and outgoing network traffic based on advanced and a defined set of security rules.