SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

level: Internet Security

Questions and Answers List

level questions: Internet Security

QuestionAnswer
Explain how a firewall worksNumbered doors called ports are opened so that only certain traffic is allowed to pass through
What is packet filteringAcceptance or blocking of packets based on their port number
What is a proxy serverA server that sits between a public network and a private network
What is stateful inspectionExamining the contents of a packet before deciding whether to allow it through the firewall
Explain what symmetric encryption isSymmetric encryption uses the same private key to encrypt and then decrypt the data being transferred
Explain what asymmetric encryption isUse of two separate but related keys to encrypt and decrypt
What is the definition of a public keyA key that can be obtained by anyone
What is the definition of a private keyA key that only the one device knows/ has access to
What is a firewallA firewall is either software or hardware that controls access to and from a network
Can a firewall be classed as a proxy serverYes
How do proxy servers improve security?Manage every packet that passes to them
How can a firewall create some sort of anonymity to devices on a networkWhen a device in a private network sends a packet through a firewall and into a public network, the packet’s “sender” address is that of the firewall, rather than the device’s private IP address. This provides some degree of anonymity to devices on private networks as their private address is never sent beyond the private network
What is the issues with symmetric encryptionThe key has to be agreed upon first More damage: Once someone has the key they can decrpyt everything
What methods allow a firewall to workpacket filtering proxy server stateful inspection
Describe what keys are used when Craig encrypts using asymmetric encryption to FrankCraig enecpytes the message with Franks public key Frank decrypts the the message with his own private key
How can worms, trojans and viruses be addressedimproved code quality monitoring protection
What are wormsMalicious software that can self-replicate between computers
How can we pick up wormsDevices within a network Users downloading and running a malicious file
What are trojansmalware that is disguised as a benign file
How can we pick up trojansEmail attachments Downloaded from malicious websites
What are virusesmalware which require a host file in which to reside
How can we pick up virusesComputers over a private network Internet Physical media: Hard drives, Flash drives, Optical disks
what are worms, trojans and viruses are all types ofmalware
How does improved code quality protect devices from malwareMalware often exploit bugs in code that enable them to take hold of a computer system
State what moneriting is and doesSpecialist pieces of software that scan the files on a computer and remove any suspicious files
How does protection protect devices from malwareReduces the exposure and opportunity of malware
Give some examples of the 'protection' technique in stopping malwareAntivirus software Modern operating systems
Give some examples of the 'monitoring' technique in stopping malwareTraining General caution