Cyber Security Test
What is a good example of a valid internal IP address?
192.168.1.20 Numbers will never be higher than 255
What is an example of a default gateway in class A?
255.255.255.0
What is hping3?
A Linux tool that sends multiple packets and can creates a DoS attack.
What is the Windows Registry?
A database that holds different system and application configurations.
What is the difference between a hub and a router?
A hub operates in layer 1, while a router operates in layer 3.
What is the role of a DNS server?
A service that translates IP addresses to common names.
What is the purpose of the DMZ?
A sub-network that exposes an organization's external facing service.
What are the advantages of using virtualization?
A. Allows a single hardware platform to provide resources for multiple servers. B. Can provide a safe lab environment for testing and threat investigation. Both are correct (a select all question)
You open Google Chrome and search for a new Razer mouse. The computer reacts slowly. What type of hardware might be causing this?
A. Network card B. Motherboard C. CPU Answer: All of the above
What is one difference between APT and Script Kiddies?
APT is typically sponsored by a nation or state, while Script Kiddies are not well-funded.
If someone hacked into a Facebook manager account and demand payment or they will release sensitive information to the public, what type of hacker would probably be involved?
Blackhat
Which aspects of the CIA triad does evidence preservation help ensure? Select all correct answers.
Confidentiality and Integrity
When your web server that conducts online transactions crashes, you examine the HTTP logs and see that an abnormal search string was executed by a single user masquerading as a customer. The crash happened immediately afterward. What type of network attack occurred?
Denial of Service (DoS)
Cyber defense services are needed for:
Detection, prevention, recovery
Ping of Death is an example of which attack?
DoS
Which is true about threads and processes?
Each process has a separate memory space, unlike threads that use the same memory space of their parent process.
What is the purpose of the DHCP server?
Enable computers to request IP addresses.
Which of the following is a name of a tool that can be used in order to initiate a MITM attack?
Ettercap
What is MAC flooding?
Flooding a switch with requests until it reverts to broadcast mode
What are the differences between Information Security and Cyber Security?
Information security is an example of physical security while cyber security is an example of web application protection. Cyber security protects against all types of cyber crimes, while information security protects the information itself.
Which of the following is a DDoS tool?
LOIC
What are the layers of the OSI model?
Layer 7 - Application. Layer 6 - Presentation. Layer 5 - Session. Layer 4 - Transport. Layer 3 - Network. Layer 2 - Data Link. Layer 1 - Physical.
Which of the following statements is FALSE? Choose one.
MAC addresses change according to the network, while IP addresses are fixed per computer and have a unique identifier. is FALSE answer
Which of the following is not an example of a DDoS attack?
Man in the middle
What is the purpose of the kernel in the operating system?
Manages hardware resources and availability to the software.
What type of network configuration would allow a VM machine to reach the Internet from its host computer?
NAT and Bridged
What is a good example of UDP protocol usage?
Online movie streaming
Which type of attack exploits a vulnerability in the TCP/IP 3-way handshake process?
SYN flood
What is the correct order of a TCP three-way handshake?
SYN, SYN-ACK, ACK
What is the purpose of the Ping command?
Send packets to check if a host is reachable.
What is the best password option that can be set to harden one's account?
Something like 70MCru!SeIsDBest
What is the difference between TCP and UDP?
TCP is a connection oriented protocol, while UDP is a connectionless protocol.
Which of the following is the least secure protocol to use when setting up a wireless network?
WEP
Which of the following is the main concept of MITM?
When an attacker is between two other hosts and intercepts the communication.
Which of the following tools cannot be used for flooding a host with network traffic?
Wireshark
What is the difference between a virus and a worm?
Worms self-replicate but viruses do not.
Which of the following is not a physical control?
anti virus
Select the terms below that make up the CIA triad?
confidentiality, integrity, availability
Which command is used to display files in a directory under the Windows OS?
dir
Which of the following Windows accounts has the weakest permissions?
guest