intro to cyber security
Wireless signals
Transmission is achieved by using infrared, microwave, or radio waves through the air.
an organization It department reports that their web server is receiving an abnormally high number of web page request from different locations simultaneously
DDoS
true or false? Certain areas of the electromagnetic spectrum can be used without a permit.
True
Network Name (SSID)
Used to identify the WLAN. All devices that wish to participate in the WLAN must have the same SSID.
Which organization is responsible for testing wireless LAN devices?
Wi-Fi Alliance
Category 5e
the most common wiring used in a LAN. The cable is made up of 4 pairs of wires that are twisted to reduce electrical interference.
risk management
the process of identifying and assessing risk to reduce the impact of threats and vulnerability
how do Cisco ISE and TrustSec work
they enforce access to network resources by creating role-based access control policies
SSID
Name assigned to a NETWORK.
what protocol is used to collect information about traffic traversing a network
Netflow
Observed data
This is captured by recording the actions of individuals, such as location data when using cell phones.
Volunteered data
This is created and explicitly shared by individuals, such as social network profiles. This type of data might include video files, pictures, text, or audio files.
Inferred data
This is data such as a credit score, which is based on analysis of volunteered or observed data.
names giving to a database where all cryptocurrency transactions are recorded
Block chain
SSID Broadcast
Determines if the SSID will be broadcast to all devices within range. By default, set to Enabled.
Network mode
Determines the type of technology that must be supported. For example, 802.11b, 802.11g, 802.11n or Mixed Mode.
True or False? If you have devices on your wireless network that are using a variety of different 802.11 standards, then you should set your network to the highest standard to get the best throughput.
False
True or false? Wi-Fi, Bluetooth, and cordless phones all use the same frequency ranges.
False
DHCP/ ICMPV6
IP address information what network i belong to address of default gateway IP address of DNS server
What measurement is used to indicate thousands of bits per second?
KBPS
SSID
Service Set Identifier
Standard Channel
Specifies the channel over which communication will occur. By default, this is set to Auto to allow the access point (AP) to determine the optimum channel to use.
Coaxial cable
an inner wire surrounded by a tubular insulating layer, that is then surrounded by a tubular conducting shield. Most coax cables also have an external insulating sheath or jacket.
what is the last stage of pen test
analysis and reporting
internet
best path through network
examples of cracking encrypted password
brute force attack Spraying Rainbow tables dictionary attacks
Fiber-optic cables
can be either glass or plastic with a diameter about the same as a human hair and it can carry digital information at very high speeds over long distances. Fiber-optic cables have a very high bandwidth, which enables them to carry very large amounts of data.
transport
communication between various devices
a port scan returns a closed response what does this mean?
connections to the port will be denied
network access
controls hardware and media throughout the network
Application
data to user encoding and dialogue control.
today, there are single security appliances that will solve all the network security needs of an organization t/f
false
with careful planning and consideration, some risk can be completely eliminated t/f
false
what is the best way to avoid getting spyware on a machine
install software only from trusted websites
which tech creates a security token that allows a user to log in to a desired web application using credentials from a social media website
open authorization
categories of security measures and controls
policy and procedures
in networking, what name is given to the identifier at both ends of a transmission to ensure that the right data is passed to the correct application
port number
Optical signals
ransmission is achieved by converting the electrical signals into light pulses.
Electrical signals
transmission is achieved by representing data as electrical pulses on copper wire.