CSULB-12A Introduction To Cybersecurity EXAM REVIEW
Give an example of a valid internal IP address.
192.168.1.3
What is an example of a Subnet Mask Class C?
255.2555.0.0
What are the Seven layers of the OSI model?
ACRONYM: All People Seem To Need Data Processing. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer
What is one difference between APT and Script Kiddies?
APT funded by government and Script kiddes small attacks
Name something that is not a physical control.
Antivirus
What is the purpose of a DHCP server?
Assign an IP address to hosts
If someone hacked into a Facebook manager account and demand payment or they will release sensitive information to the public, what type of hacker would probably be involved?
Blackhat
What would be an example of a "Strong" password option that can be set to harden one's account?
Combination of uppercase and lowercase letters, numbers and special symbols
What are the three terms that make up the CIA triad?
Confidentiality, Integrity, and Availability.
Name two aspects of the CIA triad does evidence preservation help ensure?
Confidentiality, integrity
What is the purpose of the Ping command?
Connectivity, Reachability.
What is the role of a DNS server?
Convert domain into IP addresses
What are two differences between Information Security and Cyber Security?
Cyber Security focuses on online threats as first line of defense. Information Security deals with the protection of data from any threat. Cybersecurity strikes against Cyber crimes, cyber frauds and law enforcement. Information Security focuses on securing data and Cyber security is protecting against cyber criminals
What is the purpose of the DMZ?
DMZ is a subnetwork that sits between an internal network and an external network.
Three Cyber defenses are needed for:
Detection, Prevention, Recovery
Three things Cyber defenses is needed for:
Detection, Prevention, Recovery
Ping of Death is an example of which attack?
DoS
When a web server that conducts online transactions crashes by a single attacker, what type of network attack occurred?
DoS
What is a name of a tool that can be used in order to initiate a MITM attack?
Ettercap
Name a wireless attack that involves impersonation of a Wifi Access Point?
Evil Twin
MAC addresses change according to the network, while IP addresses are fixed per computer and have a unique identifier?
False
What is MAC flooding?
Floods the MAC address table to have the switch act like a hub
Name a Windows account with the weakest permission/access?
Guest
What is the difference between a hub and a router?
Hub is on Physical Layer (1) , Router is on Network Layer (3)
What is the main concept of MITM?
Intercept traffic between two people without being detected
Name a popular DDoS tool.
Low Orbit Ion Cannon (LOIC)
What is the difference between an IP address and an MAC address?
MAC is physical IP is logical
Name an attack that is not a DDoS attack?
MITM
What is the purpose of the kernel in the operating system?
Manage hardware and resources.
What is the purpose of DiD?
Multilayer defense
Which network adapter setting assigns an IP address for the VM client machine from the physical host machine?
NAT
What two types of network configurations would allow a VM machine to reach the Internet from its host computer?
NAT or Bridge
What is true about threads and processes?
Process own memory space. Threads use the memory of the process they belong to.
You open Google Chrome and search for a new mouse. The computer reacts slowly. Name three types of hardware might be causing this?
Processor, Ram , Memory.
What is the purpose of a server operating system, such as Windows Server?
Provide services and information by sharing resources and distribution.
If someone downloads a malicious program that encrypts data and demands payment for its restoration, what type of malware is used?
Ransomeware
What is the correct order of a TCP three-way handshake?
SYN, SYN-ACK, ACK (Synchronize. Synchronize/Acknowledge, Acknowledge)
What are the advantages of using virtualization?
Safe testing environment for testing and isolated. Isolated and in a sandbox and threat investigation. They allow multiple operating systems (OS) environments to exist simultaneously on the same machine.
Which type of attack exploits a vulnerability in the TCP/IP 3-way handshake process?
TCP SYN flood (a.k.a. SYN flood)
What is the difference between TCP and UDP?
TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol.
What is the Windows Registry?
The windows registry holds all the configuration settings for the applications and os
What is a good example of UDP protocol usage?
VOIP
Which wireless protocol should not be used when setting up a wireless network because it is the weakest?
WEP
Which network analysis tool cannot be used for flooding a host with network traffic?
Wireshark
What is the difference between a virus and a worm?
Worms are replicated. Viruses are triggered by users.
Name the command to display files in a directory under the Windows OS?
dir
Name a tool that can be used to flood a host with traffic?
hping3