cyber 12 weeks

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

When you enter the URL http://www.goarmysports.com/index.html into your browser's address bar, what server gets contacted before the browser sends the GET request to the goarmysports web server?

USNA's DNS Server

End user programs, such as the Chrome web browser.

application

Ransomware uses encryption to "lock" a users data until a ransom is paid. What pillar of cybersecurity does ransomware most explicilty violate by not allowing victims to use their data?

availability

Hacktivist organization Anonymous revealing the names and addresses of several public officials is an example of

black hat hacking

Infecting SCADA systems and PLCs at one of Iran's nuclear facilities with the Stuxnet virus is an example of

black hat hacking

In order to gain access to a computer room, a malicious actor shows an ID belonging to a legitimate employee. This is an example of which kind of attack?

impersonation

A 'slip' is the ___________ execution of a(n) ___________ action

incorrect; correct

Many security vulnerabilities in computer programs result from what?

input handling

What is the command for viewing your IP address on a Windows machine?

ipconfig

Routes packets between interconnected networks.

network

A ________ is a well-defined agreement that governs the communication between two entities.

protocol

____________ is the social principle which says that we should return favors

reciprocation

Which is better at providing data confidentiality, a switch or a hub?

switch

What is the purpose of computer networking?

to provide a way for two computers to communicate

Connects processes on communicating hosts.

transport

Which layer of the Stack does the Application Layer interact with directly?

transport

Match the malware description to the correct label. _____ a program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms.

trojan horse

A computer may have multiple interfaces; i.e. it may have multiple MAC addresses associated with it.

true

A router is the gateway between different networks.

true

An Application Layer protocol may interact with both users and other Application Layer protocols.

true

An email client that automatically renders HTML may be a security concern since it may process an email with embedded JavaScript.

true

Any Data Link layer protocol has an interface that serves as a physical connection to the Physical layer.

true

Code snippets on web pages, which produce dynamic content, are usually produced using JavaScript code.

true

Routers are devices that route messages between networks.

true

Put these cyber-related events in relative chronological order:

1. Babbage conceptualizes the Analytical Engine 2. Alan Turing conceptualizes his machine 3. BESM-2 is invented 4. Phone phreakers utilize social engineering techniques to gain privileged access to telephone lines 5. The first commercially-available personal computer is invented

What caused the USS Yorktown to be stopped dead in the water for three hours?

A divide by zero error that crashed the system.

What does DDoS stand for and what hacker group became widely known for its use of DDoS?

Distributed Denial of Service: Anonymous

Which of the following are examples of "link" (Data Link layer protocols)?

Ethernet Cellular (CDMA, EDGE, 3G, 4G, LTE, 5G) MAC address Wifi

Which of the following are not true of the ARP table?

Every host on the local network always has the same ARP table. (This one) A host fills their ARP table by sending an announcement frame to the broadcast MAC address. ARP tables are sometimes likened to phonebooks. ARP tables are comprised of the MAC addresses for all the discovered/known hosts on a local network.

What is the broadcast MAC address in hexadecimal?

FF:FF:FF:FF:FF:FF

What is the primary difference between HTTP and HTTPS?

HTTPS uses encryption to hide the information in the network traffic, HTTP does not.

The following code causes the popup displayed below to come up. prompt("Hi");

Hi false

How can viewing certain webpages cause your laptop's batteries to die noticeably faster than others?

If the page has client-side scripts that are continuously running, it will use extra CPU cycles and therefore more power.

What is the purpose of the Network Layer?

It interconnects separate local networks forming a set of connected networks

Match the following services to their port number:

SMTP (Simple Mail Transfer Protocol): 25 NTP (Network Time Protocol): 123 DNS (Domain Name Service): 53 RDP (Remote Desktop Protocol): 3389

Which Transport Layer protocol(s) establish a connection, then hosts communicate via the connection?

TCP

Which Transport Layer protocol(s) provides communication between processes on different hosts?

TCP

Why is TCP the preferred Transport Layer protocol for email? What makes UDP less desirable for email?

TCP is reliable; lost packets are resent, out-of-order packets are rearranged after receipt. UDP is unreliable; packets may be lost or arrive out of order.

The purpose of the Internet Control Message Protocol is:

The ICMP is a companion protocol to IPv4 that reports errors back to a source address.

What is the primary reason IPv6 is being implemented?

The IPv4 address space is essentially exhausted

Which Transport Layer protocol(s) is unreliable, i.e. data may be lost or arrive out of order.

UDP

In the code [ x = prompt() ] After a value is entered into the pop-up box, what is the datatype of x?

a string

A _______ requests a service from or sends a request to a server.

client

Match the malware description to the correct label. _____ is a self-replicating, self-propagating program that uses networking mechanisms to spread itself.

computer worm

[ if ], [ else ] and [ else if ] statements are examples of...

conditional statements

______ and ______ are the two pillars of cyber security that the SSH protocol helps to protect.

confidentiality; authentication

A 'mistake' is the ___________ execution of a(n) ___________ action.

correct; incorrect

Connects hosts that are on the same local network.

data link

The physical layer is concerned with converting bits and bytes into _____________.

digital signals

Named elements in JavaScript can be found by using what function call?

document.getElementById(...)

Melissa wants to check her FaceBook account during her lunch break, but accidentally types www.faceboook.com into her browser. Nevertheless, Facebook seems to load.

domain squatting

The process of wrapping data passed down the stack from a higher layer with header or footer data is called ______ . As data goes back up the stack ______ is the process of removing header or footer data, and passing data up to the higher layer.

encapsulation; de-encapsulation

10.240.108 is a valid IPv4 Address.

false

Form elements cannot be used to send information back to a server to process and output to the client.

false

Hubs are often seen in wireless networks today

false

Private IP addresses completely protect the hosts from potential hackers.

false

Since the Physical Layer focuses solely on transmitting and receiving digital signals, any errors that arise during transmission do not need to be addressed higher up the TCP/IP stack.

false

TCP is the best protocol choice for live video streaming.

false

The Ethernet protocol is always reliable. There is a guarantee of message delivery by the Ethernet protocol.

false

The Physical Layer can detect errors and correct data transmission errors before passing the data up the stack to the next layer.

false

UDP utilizes a "three-way handshake" method of communication.

false

Which of the following are a part of the physical layer that can transmit digital information?

fiber optic cables wireless signals electrical cables

Alexey hacking routers for the purpose of patching their vulnerabilities is an example of

grey hat hacking

A _________ is a computer connected to a network.

host

Putting this URL http://www.w3.org/ in your browser's address bar is the same as which?

http://www.w3.org:80/

The main hardware device we discussed in class that belongs to the physical layer is:

hub

What is considered by cybersecurity researchers to be the "weakest link" in any computer network?

human users

Don in accounting receives a call from the IT Department claiming that there is an issue with his account, and his username and password are needed to correct it.

impersonation

Suppose you gave a netstat -a command on your laptop, and discovered the below network connections. Would it "make sense" to see such a connection, based on examining the port numbers and IP addresses? Assume your laptop is at USNA, and that you don't have any unusual software running on your laptop. Local: 10.22.20.10:53 Remote: 10.22.20.18:42000

no

script to be run on a mouse click

onclick

script to be run on a mouse double-click

ondblclick

script to be run when mouse button is pressed

onmousedown

script to be run when mouse pointer moves

onmousemove

script to be run when mouse pointer moves out of an element

onmouseout

script to be run when mouse pointer moves over an element

onmouseover

script to be run when mouse button is released

onmouseup

Transmits digital signals across a transmission medium.

physical

A ________ provides a service by processing and responding to received requests.

server

Determine whether the html code is representative of a server side or client side system. "http://courses.cyber.usna.edu/SY110/f2c.jsx"

server

Phone hacker John Draper described ___________ as "the ability of going in and talking to people on the inside of the phone company...making them believe you were working for the phone company".

social engineering

Betty (CIO) receives an email from the software development group asking for her feedback on an attached project deliverable. In actuality, the attachment is a malicious program.

spearphishing

Which is better at providing network availability, a switch or a hub?

switch

In order to gain access to their target facility, a malicious actor follows an employee in, bypassing the badge reader by ensuring that the door never closes. This is an example of which kind of attack?

tailgating

Each layer only needs to know how to interact with the layers directly above and directly below.

true

If a router cannot figure out how to get a packet to its destination, ICMP will be used to report the problem to the original source address.

true

If a router determines that a source and destination IP are on the same local network, it will route the packet to the destination host directly.

true

On a static webpage, you can only see different content by loading different web pages.

true

Server side validation is a better defense than Client side validation when trying to stop malicious users trying to submit dangerous input.

true

True or False: A web server always has to listen on the default HTTP port in order to communicate using HTTP?

true

True or False: Penetration testing is when hackers are hired to discover security flaws in a company.

true

Which of the following are a part of the physical layer that can transmit digital information?

true

Domain names are hierarchical. What part of the domain name rona.academy.usna.edu is common to the domain names of all hosts at the Academy?

usna.edu

Match the malware description to the correct label. A _____ is a computer program that cannot replicate itself and/or "infect" a computer without user intervention (i.e. clicking on/installing something).

virus

Hired penetration testers breaching the firewall of an engineering firm and gaining the ability to view the account information of both employees and customers is an example of

white hat hacking

Suppose you gave a netstat -a command on your laptop, and discovered the below network connections. Would it "make sense" to see such a connection, based on examining the port numbers and IP addresses? Assume your laptop is at USNA, and that you don't have any unusual software running on your laptop. Local: 10.1.74.10:42000 Remote: 10.1.83.17:22

yes

Suppose you gave a netstat -a command on your laptop, and discovered the below network connections. Would it "make sense" to see such a connection, based on examining the port numbers and IP addresses? Assume your laptop is at USNA, and that you don't have any unusual software running on your laptop. Local: 10.22.20.18:31337 Remote: 128.194.138.74:80

yes

Select all of the following that accurately describe a Local Network.

All of the hosts on a local network are able to directly communicate with each other. All hosts on a local network have a different MAC address.

What does the alert() function in JavaScript do?

Display text in a dialog box that pops up on the screen

Which of the following are NOT aspects of what is understood to be the "hacker ethic?"

Obedience to law enforcement Access to peripherals is a right

Describe the security advantage/relevance of Network Address Translation (NAT).

Potential attackers on the Internet can't easily scan private IP space for vulnerable hosts. With NAT, your host is "hidden" (in a way) behind the translation


Kaugnay na mga set ng pag-aaral

Physiological Psych. Module 5.2 Quiz

View Set

Chapter 11: Airway Management Quiz

View Set

Entschuldigung, wie komme ich...? (19.07.2017)

View Set

Configure Local Storage & File Systems

View Set

mastering genetics ch 5. linkage and mapping

View Set

chapter 8 fundamentals of nursing practice questions

View Set