CO1201 Computer Security Quiz
38 Questions
1 Views

CO1201 Computer Security Quiz

Created by
@EfficientAndradite

Questions and Answers

What is the primary purpose of encryption?

To hide the information's true meaning

Which of the following is NOT a type of encryption method?

IDS

What is the primary function of a firewall?

To filter packets in a network

Which of the following threats can be prevented by using encryption?

<p>Sniffing, Eavesdropping, MitM</p> Signup and view all the answers

What is the primary goal of system security?

<p>To minimize downtime, interference, and malicious intrusion</p> Signup and view all the answers

What is a physical threat to a system?

<p>Physical access to devices</p> Signup and view all the answers

What is a common technique used to extract passwords?

<p>Sniffing</p> Signup and view all the answers

What is a design problem related to passwords?

<p>Using personal data</p> Signup and view all the answers

What is an operation issue related to passwords?

<p>Using common passwords</p> Signup and view all the answers

What is an application issue related to passwords?

<p>Password checking issues</p> Signup and view all the answers

What is a good practice for creating passwords?

<p>Using a sentence to create a password</p> Signup and view all the answers

What is an alternative to passwords?

<p>Biometric data</p> Signup and view all the answers

What is a type of biometric data?

<p>All of the above</p> Signup and view all the answers

What is the estimated cracking time for the password '1’mAen6Std@'?

<p>400 years</p> Signup and view all the answers

What is the primary purpose of a Trojan horse?

<p>To do something malicious or spy for the attacker</p> Signup and view all the answers

What is a characteristic of a virus?

<p>It requires user action to spread</p> Signup and view all the answers

Which of the following is a risk associated with spam?

<p>Time wastage</p> Signup and view all the answers

What is a method of infection for malware?

<p>Through infected files</p> Signup and view all the answers

What is a prevention method for malware?

<p>Installing anti-virus software</p> Signup and view all the answers

What is a characteristic of a worm?

<p>It can travel from one computer to another without user action</p> Signup and view all the answers

Which of the following is a method of infection for malware?

<p>Through network</p> Signup and view all the answers

What is a risk associated with malware?

<p>All of the above</p> Signup and view all the answers

What is the primary difference between a credit card and a debit card?

<p>Credit cards allow cardholders to borrow funds, while debit cards directly debit money from the bank account.</p> Signup and view all the answers

What is an example of a fraud technique involving credit cards?

<p>Creating a fraudulent card using an existing card number and PIN.</p> Signup and view all the answers

What is a security measure used to prevent credit card fraud?

<p>Requesting additional information, such as a postal code or PIN number.</p> Signup and view all the answers

What is a feature of smart cards?

<p>A microprocessor and memory chip in addition to a magnetic strip.</p> Signup and view all the answers

What is a benefit of using RFID technology with smart cards?

<p>It enables the creation of virtual cards instead of physical cards.</p> Signup and view all the answers

What is a common type of fraud involving credit cards?

<p>Forgery.</p> Signup and view all the answers

What is a way to improve security when using credit or debit cards?

<p>Requesting additional information, such as a postal code or PIN number.</p> Signup and view all the answers

What is a feature of smart cards that allows for more secure transactions?

<p>A microprocessor and memory chip.</p> Signup and view all the answers

What is the primary goal of Physical Network Security?

<p>To prevent unauthorized physical access to network components.</p> Signup and view all the answers

Which of the following is NOT a type of Network Security category?

<p>Information Network Security</p> Signup and view all the answers

What is the main purpose of keeping a backup station (DR) in Physical Network Security?

<p>To maintain network services in case of a disaster</p> Signup and view all the answers

Which type of attack involves intercepting packets passing through the network?

<p>Sniffing</p> Signup and view all the answers

What is the primary goal of Administrative Network Security?

<p>To control user behavior of using the network.</p> Signup and view all the answers

What is Eavesdropping also known as?

<p>Sniffing</p> Signup and view all the answers

What is the primary goal of Technical Network Security?

<p>To protect data stored and in transit.</p> Signup and view all the answers

Which of the following is NOT a type of Network based attack?

<p>Firewall</p> Signup and view all the answers

Study Notes

Network Security

  • Network security categories:
    • Physical Network Security: prevent unauthorized physical access to network components
    • Administrative Network Security: controls user behavior of using the network
    • Technical Network Security: protect data stored and in transit

Physical Network Security

  • Access control:
    • Badges/ IDs
    • Biometrics (face detection, Iris and Fingerprints)
    • Smart locks
    • Key pads
  • Surveillance:
    • 24/7 cameras
    • Guards
    • Sensors-based mechanisms
  • Backup station (DR)

Administrative Network Security

  • Allow only privileged personnel to make changes to the network
  • Keep a log of the changes made

Technical Network Security

  • Network-based attacks:
    • Sniffing/ Eavesdropping
    • Man-in-the-middle attack
    • Spoofing
    • Denial of Service

Eavesdropping

  • Information like passwords, card details, and other sensitive data is easily stolen while it is getting transferred from one device to another
  • Also known as sniffing attack

Sniffing

  • Access to the network and intercept packets passing through the network
  • Prevention methods:
    • Intrusion Detection Systems (IDS)
    • Encryption

Encryption

  • Information is converted into a secret code that hides the information's true meaning
  • Use a key to:
    • Make the secret code
    • Get the message from secret code
  • Process:
    • Encrypt at the sender
    • Decrypt at the receiver
  • Encryption methods:
    • WEP, WPA, WPA2, RSA
    • IPSec

Firewall

  • Filters packets:
    • Receiving to the network (Ingress traffic)
    • Sending from the network (Egress traffic)
  • Check the rules in Windows firewall for filtering packets

Prevention Methods

  • Sniffing, Eavesdropping, Man-in-the-middle: Encryption
  • Spoofing, DoS: IDS, Firewall

System Security

  • Controls and safeguards taken to minimize:
    • Downtime
    • Interference
    • Malicious intrusion
  • Categories:
    • Physical security
    • OS and application security

Physical Threats to a System

  • Physical access to devices
  • Attaching components to devices
  • Tamper with devices
  • Jamming the wires
  • Prevention methods:
    • Access control
    • Surveillance
    • Backup

Attacks on OS and Applications

  • Password attacks
  • Malware attacks
  • Pharming
  • Spams
  • Phishing attacks

Password Attacks

  • Common technique to authenticate systems
  • Can extract by:
    • Sniffing
    • Brute force
    • Dictionary attack
  • Prevention methods:
    • Set a good password that cannot be guessed easily
    • Account lock features
    • Multi-factor authentication
    • Encryption

Good Practices for Creating Passwords

  • Dos:
    • Lengthy password
    • Case-sensitive password
    • Numbers and special characters included
    • Random characters
    • Memorable password
  • Don'ts:
    • Personal data
    • Short passwords
    • Repetitive characters
    • Same password for multiple applications

Alternatives to Passwords

  • Biometric data:
    • Signature
    • Face recognition
    • Voice recognition
    • Fingerprint
    • Iris pattern
  • Additional questions

Malware

  • Methods of infection:
    • Network
    • Infected files
    • Websites
    • Email
    • USB
  • Prevention methods:
    • Install anti-virus software and anti-spyware software

Credit/ Debit Cards

  • Allows cardholders to borrow funds to pay for goods and services
  • Credit cards:
    • Customer has to pay back the amount to the bank after the purchase in a given time
    • Otherwise, interest is added
  • Debit cards:
    • Customer directly debits money from the bank account
  • Frauds:
    • Using credit card number and PIN number for transaction without the knowledge of the owner
    • Forgery
  • Prevention methods:
    • Request additional information
    • Verification code
    • Daily transaction limit

Smart Cards

  • Most credit and debit cards are now smart cards
  • Includes:
    • Microprocessor
    • Memory chip
    • RFID
  • Has to place in the device instead of swiping
  • RFID allows creating virtual cards instead of physical cards using smartphones

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz covers the basics of computer security, including network security and system security. It's a part of the introduction to computer systems course.

More Quizzes Like This

Computer Security Fundamentals
5 questions
Network Security: Types of Threats
5 questions
Cyber Security: Network Threats
36 questions
مقدمة في الأمن السيبراني
10 questions
Use Quizgecko on...
Browser
Browser