Quiz 1.4: Network Security
What is the name of the attack that involves flooding a target with network traffic to make it inaccessible?
Why might a person or organisation create malicious software?
Listening-in to communications between two devices is known as…
How can input validation help protect against SQL injection?
What is the name of the encryption method that uses the same key to encrypt and decrypt data?
What is the term for software that is designed to cause harm or damage to a computer system?
A memory stick, loaded with malware, is purposely left for a victim to find and use. This is known as…
What role does input sanitisation play in SQL injection prevention?
What is the term for the software that monitors and controls incoming and outgoing network traffic based on predefined rules?
What is the term for the process of converting encrypted data back into its original form?