Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
4 factors to consider when choosing a network infrastructure device for purchase? |
Cost, ports, speed, manageable |
|
Define Trojan horse? |
An application that looks good to download and use when in fact it is an attack tool |
|
When considering AAA to mitigate network attacks what is the purpose of authorisation? |
States what an authenticated person is allowed to do on a device. |
|
Classes of physical threats include hardware, environmental, electrical and maintenance. State 2 examples of environmental threats? |
Too hot, too cold too wet, too dry |
|
What are 2 examples of maintenance threats when working on your network? |
Electrostatic discharge, no spare parts for repair |
|
What are 3 network attacks |
Reconnaissance attack Access attack - unauthorised manipulation of data Denial of service |
|
What are 2 examples of reconnaissance attacks? |
Packet sniffers Internet searches about the target Social phishing |
|
What’s a Dos attack? |
Something that disrupts a network service so that legitimate network users are not able to access it properly |
|
What are 2 examples of security policy vulnerabilities? |
Policy not written down or bits missing Policy not followed eg: when installing software or hardware |
|
What are 2 electrical threats to a network? |
Power spike Black out |