1. An example of social engineering is the use of a trojan horse.
2. Malware distribution is legal in most countries and helpful in preventing security breaches.
3. Viruses are engineered pieces of code that cause great destruction. They do not need to attach themselves to a program unlike worms.
4. Worms are a type of social engineering and are designed to mislead and attach to other programs.
5. Trojan horses are designed to access a computer by misleading users of its? intent by prompting to download a program
6. Viruses cannot affect a user's hard drive, so files saved on the hard disk are always safe.
7. Sending requests to a single server using hijacked machines is commonly referred to as Phishing
8. Social engineering, phishing and worms are all examples of viruses.
9. Data travels across networks in __________-- and these ________are vulnerable to interception.
10. The download and installation of 'patches' can protect organisations against attacks like SQL injections.
11. An SQL injection can grant an attacker access to a _____________ where they can manipulate or even steal all the data.
12. SQL injections typically cause unauthorised access to databases, servers, mainframes as well as directly to the PCs CPU.
13. Netwok forensics primarily involves the examination of comptuer data that is stored in archives.
14. What is needed to decrypt an encrypted file?
15. Many failures in security can be attributed to human weakness, misunderstanding, misinformation, misdirection, or failure to grasp the importance of prescribed processes and procedures.