1. What can viruses affect?
2. How do hackers use viruses?
3. Sending requests to a single server using hijacked machines is:
4. Social engineering, phishing and worms are examples of:
5. Data travels across networks in ….
6. Organisations can protect themselves from SQL injections attacks by downloading and installing
7. A network of computers infected with malicious software and controlled as part of a group without the owner's knowledge is:
8. Network forensics typically involves the examination of data sent across a network
9. Packet sniffing' is an example of a network forensic technique
10. Law enforcement agencies can intercept data under what law?
11. This is software that provides a 'barrier' between a potential hacker and the computer system
12. These define access permissions for a user (pertaining to a network)
13. Additional security requirements to use alongside passwords could include:
14. Encryption is a method of bypassing viruses and ensuring that code is stored as plain text securely.
15. Typically, what level of access what a student have to the network, in a school?
16. They are side effects of the freedom and ease of communicating online and therefore…
17. An example of social engineering is:
18. A example of a network policy that may help with security is:
19. Malware is a manufacturer of corrupt (but cheap) computer parts
23. Networks like the internet are wonderful inventions and they are risk-free and completely safe.
24. The security that is associated with networks and particularly the internet is called:
25. One method of data interception is:
26. There are typically two well known types of penetration test targets: What are they?
27. Penetration testing can never be carried out manually by individuals who are capable of carrying out attacks.
28. Hackers that carry out penetration testing are sometimes called:
29. White box testing assumes knowledge of the internals of the systems.
30. Pharming is terrifying because the email can be legitimate but clicking on the link takes you to a hacker's website. How?
31. ____________ is when the perpetrator obtains information while watching you use the device they want access to.
32. Baiting is like the real-world Trojan horse that uses physical media and relies on the _____________ of the victim
33. Organisations can reduce their security risks by:
34. An example of blagging is a hacker calling a company and pretending to be their network manager.
35. The attacks used in social engineering can be used to steal employees' confidential information. One common type of social engineering …
36. Another example of social engineering is a criminal posing as exterminators, fire marshals and technicians to go unnoticed and…
37. Spyware are programs that inject adverts into pages and programs on your computer with the aim that the hacker gets advertising revenue
38. Spyware gathers data about people without their knowledge, including sensitive data like passwords
39. You can minimise the risk of malware by:
40. Some spyware can even use your laptop or comptuer's webcam without your knowledge!
41. The following list are methods that ….
42. Penetration testing can be carried out by people who simulate an attack on a system to expose …………..
43. A common form of biometric security scanning used in school canteens and mobile phones is:
44. One of the worst things you can do in terms of keeping passwords secure is to:
45. A longer password is always better in terms of a hacker being able to brute force hack it.