• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

4 factors to consider when choosing a network infrastructure device for purchase?

Cost, ports, speed, manageable

Define Trojan horse?

An application that looks good to download and use when in fact it is an attack tool

When considering AAA to mitigate network attacks what is the purpose of authorisation?

States what an authenticated person is allowed to do on a device.

Classes of physical threats include hardware, environmental, electrical and maintenance. State 2 examples of environmental threats?

Too hot, too cold too wet, too dry

What are 2 examples of maintenance threats when working on your network?

Electrostatic discharge, no spare parts for repair

What are 3 network attacks

Reconnaissance attack


Access attack - unauthorised manipulation of data


Denial of service

What are 2 examples of reconnaissance attacks?

Packet sniffers


Internet searches about the target


Social phishing

What’s a Dos attack?

Something that disrupts a network service so that legitimate network users are not able to access it properly

What are 2 examples of security policy vulnerabilities?

Policy not written down or bits missing


Policy not followed eg: when installing software or hardware

What are 2 electrical threats to a network?

Power spike


Black out