NSA CNT Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is a Bootkits Rootkit? 1. Privilege Level 2, Infection Method 3. Detection Method

1. Privilege Level - Operate at the bootloader level, before the operating system loads 2, Infection Method - Modify the master boot record (MBR) or other boot components to gain control during the boot process 3. Detection Method - Bootkit detection often requires specialized tools that can analyze the boot process

What is a Memory-Resident or RAM-Based Rootkit? 1. Privilege Level 2, Infection Method 3. Detection Method

1. Privilege Level - Operate in the system's memory 2, Infection Method - Load directly into RAM, making detection more challenging 3. Detection Method - Memory analysis tools and behavioral monitoring can help identify anomalies in system memory.

What is a Kernel Mode Rootkit? 1. Privilege Level 2, Infection Method 3. Detection Method

1. Privilege Level: Operate at the kernel or ring 0 level 2. Infection Method: invade the core of the operating system, replacing or modifying kernel components 3- More challenging to detect, specialized tools, memory analysis, and behavioral monitoring

Administration distance of OSPF

110

Administration distance of RIP

120

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?

15

By default, what is the MTU size on a typical Ethernet network?

1500 bytes

Administration distance of BGP

200

Administration distance of EIGRP

90

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? a. The network card has been erroneously assigned a loopback address. b. The computer has been assigned a routed public IP address. c. The network card is set up for multicast communication. d. The computer is configured to use DHCP, but was unable to lease an address.

D The computer is configured to use DHCP, but was unable to lease an address.

What is the minimum category of UTP cable required in order to support Gigabit speeds? a. Cat 5 b. Cat 6 c. Cat 3 d. Cat 5e

D. Cat 5e

OSI Model Physical Layer

Data communication through physical channels like fiber-optic cables, copper cabling, and air Ex: Bluetooth, NFC, data transmission speeds

ipconfig /displaydns

Display's all DNS connections

powercfg /energy (Windows)

Displays power usage information

What is DNS and what port does it use

Domain Name System is used to resolve host names to IP addresses. DNS servers host the DNS service and respond to DNS queries. DNS uses UDP port 53.

What is DHCP and what port does it use?

Dynamic Host Configuration Protocol Automatically sets IP addresses and other attributes to an IP host to enable information transfer between network nodes UDP Port 67

What command is used to edit a file in Linux (2)

Echo to add lines to a file Nano to edit the file

Computer Concepts - Endianness

Endianness means that the bytes in computer memory are read in a certain order - If my computer reads bytes from left to right and your computer reads from right to left were going to have issues communicating

What is EIGRP?

Enhanced Interior Gateway Routing Protocol Send updates from one router to the next, only neighbors exist

Data Integrity Protection (Tripwire)

FIM (Tripwire File Integrity Monitoring) built in capability to reduce noises by providing ways to determine low risk change from high risk change in data Alerts changes to files and directories on a computer system

UDP provides error checking, but not sequencing (T/F)

False

Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm. (T/F)

False RIP is a distance-vector routing protocol. It uses the Bellman-Ford algorithm to determine the best path to a destination based on the number of hops.

What is FTP and what port does it use

File Transfer Protocol is used to upload and download files from an FTP server. FTP uses ports TCP 20 & 21

What is HTTP and what port does it use?

HTTP is HyperText Transfer Protocol and it is responsible for web content. Many web pages use HTTP to transmit the web content and allow the display and navigation of HyperText. TCP Port: 80

Access to Resources Kernel Space: User Space:

Kernel Space - the kernel has direct access to all hardware and system resources User Space: user applications do not have direct access to hardware resources. They interact with the system through system calls provided by the kernel

Privileges Level Kernel Space: User Space:

Kernel Space - the kernel operates in a privileged mode with unrestricted access to the hardware and system resources User Space: User applications operate in a less privileged mode, typically at a lower privilege level then the kernel

Execution Context Kernel Space: User Space:

Kernel Space: the kernel runs in a global and shared context, and its code is typically loaded into a fixed location in memory during system boot User Space: each user application runs its isolated context, with its own memory space and resources

What is nslookup (Windows)

Lets user enter a host name and find out the corresponding IP address or domain name system

Antivirus Concepts: Heuristic

Looks for specific commands or instructions that would not typically be found in an application Ex: the payload of a trojan The replication mechanics of a virus the distribution pattern of a worm

What are Noise Signatures in the context of malware?

Refers to the observable and detectable patterns or behaviors that can be identified by security tools and analysts. These patterns may generate network or system activity that stands out from normal behavior making it possible to detect and mitigate malware

What are some benefits of Virtualization?

Resource Efficiency Easier Management Minimal Downtime Faster Provisioning

Antivirus concepts: Signature

Signature based antivirus is a type of security software that uses signatures to identify malware. Signatures are bits of code that are unique to a specific piece of malware compares signature to a known database

Data Integrity Protection (WFP)

Windows File Protection prevents programs from replacing critical Windows system files because these files are used by the operating system

What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling? a. 100Base-T b. 10TBase-T c. 10GBase-T d. 1000Base-T

c. 10GBase-T

Which of the following is NOT a range of IP addresses recommended for use in private networks? a. 10.0.0.0 through 10.255.255.255 b. 192.168.0.0 through 192.168.255.255 c. 172.16.0.0 through 172.31.255.255 d. 127.0.0.0 through 127.255.255.255

d. 127.0.0.0 through 127.255.255.255

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

ping

What commands to move and remove a file in Linux?

rm - remove mv = move

How to encrypt a file on a Linux machine what command?

shred (filename)

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received

sliding window

What are the different types of CPU architectures?

ia32 - 32-bit intel Architecture mipsel - 64 bit Microprocessor 32 and 64 bit systems

What is Virtualization

is a process that allows for more efficient utilization of physical computer hardware and is the foundation of cloud computing

Which command will produce statistics about each message transmitted by a host, separated according to protocol type?

netstat -s

Botnets and there Key Features

- Compromises multiple computers to form a network of bots used for DDoS attacks

Rootkits and there Key Features

- Conceals its presence or other malware from detection - Often modifies the operating system or kernel components - Can be challenging to detect and remove

What are some basic functions of a network router?

- Connect dissimilar networks, such as LAN and a WAN, which use different types of routing protocols - Interpret Layer 3 and often Layer 4 addressing - Determine the best path for data to follow from point A to point B - Reroute traffic if the path of first choice is down but another path is available

Trojan Horses and there Key Features

- Disguises itself as a legitimate or benign program - Tricks users into executing or installing it - Can create backdoors for remote access

Adware and there Key Features

- Displays unwanted advertisements to users - May come bundled with legitimate software

Viruses and there Key Features

- Infects other executable files or documents - Spreads when infected files are shared or executed - Often requires user interaction to propagate

Spyware and there Key Features

- Secretly monitors user activities without their knowledge - Collects sensitive information such as login credentials or browsing habits - Often used for identity theft or espionage

Worms and there Key Features

- Self replicates and spreads across networks without user intervention -Exploits vulnerabilities in network protocols or operating systems - Can consume network bandwidth and system resources

A Fast Ethernet connection utilizes what pins on an RJ-45 plug?

1 , 2 ,3 , 6

What is Kerberos?

Kerberos authenticates service requests between two or more trusted hosts across an untrusted network like the internet Kerberos Authentication: 88

What is windows registry?

A database on your hard drive to store settings for various programs and applications

What is a device driver?

A device driver is a special kind of software program that controls as specific hardware device attached to a computer

What part of a MAC address serves as the extension identifier, or device ID? a. The last 24 bits of the MAC address. b. The last 12 bits of the MAC address. c. The first 24 bits of the MAC address. d. The first 12 bits of the MAC address.

A. The last 24 bits of the MAC address

What is ARP? What port does it use?

Address Resolution Protocol The protocol that translates IP addresses into MAC addresses Works between layers 2-3 of the OSI model, ALL layer 3 devices have an ARP table Only translates 32-bit IP addresses to 48-bit MAC addresses Port - 219

Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols? a. OSPF b. EIGRP c. IS-IS d. BGP

B: EIGRP

Which of the following is not a task handled by a router? :a. A router can connect dissimilar networks .b. A router forwards broadcasts over the network .c. A router can interpret Layer 3 and often Layer 4 addressing. d. A router can reroute traffic if the path of first choice is down but a second path is available.

B: a router forwards broadcasts over the network

Big-Endian (BE) vs Little-Endian (LE)

BE stores the big end first and then proceeds to the lowest, from left to right LE stores the little end first. from right to left

What is the difference between bandwidth and throughput?

Bandwidth is the amount of data that could theoretically be transmitted during a given period of time. Throughput is the measure of how much data is actually transmitted during a given period of time

Endianness is represented in two ways what are they?

Big-endian (BE) and Little Endian (LE)

There are several interior gateway protocols, but only one current exterior gateway protocol. What is this protocol, and what characteristics does it have?

Boarder Gateway Protocol BGP is the only current exterior gateway protocol. BGP spans multiple autonomous systems and is used by edge and exterior routers of the internet

OSI Model Network Layer

Concerned with concepts such as routing, forwarding, and addressing across a dispersed network Ex: IPv4, IPv6, switch, router

OSI Model Application Layer

Concerned with the specific type of application itself and its standardized communication methods

OSI Model Presentation Layer

Concerned with the syntax of the data itself for applications to send and consume - HTML, JavaScript

Which type of virtualization allows a computer's operating system kernel to run multiple isolated instances of a guest virtual machine, with each guest sharing the kernel?

Container Virtualization

What are the different categories of routers, and how do they compare?

Core Routers - also called interior routers, are located inside networks within the same autonomous system. Often on the same domain Edge Routers - or border routers, connect an autonomous system with an outside network (untrusted) Exterior Routers - refers to routers outside the organizations zone.. Routers who communicate with Routers outside a zone

Memory Organization (Offsets)

In the context of memory, it's the distance from the start of a data structure or memory block

What is routing protocol convergence time defined as?

It is the time it takes for the protocol to recognize the best path in the event of a network change

OSI Model Data Link Layer

Manages data frames, digital signals are encapsulated into data packets Split into two sub layers MAC and LLC Layer

Windows Specific Port Services

NetBIOS Name Services: Port 137 NetBIOS Datagram Service: UDP 138 - allows for windows to transfer information over a connectionless communication NetBIOS Session Service: TCP 139 - setting up a session between devices

OSI Model Session Layer

Network coordination between two separate applications in a session. Session manages the beginning and ending of a one to one application connection

What is OSPF?

Open Shortest Path First Builds a map of the entire network and chooses the best routes to take

OSI Model Layers 1-7

Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer

What is a User Mode Rootkit 1. Privilege Level 2, Infection Method 3. Detection Method

Privilege Level: Operate at the user level Infection method - typically infiltrate user-space processes and applications Detection Method - may be detected using rootkit scanners, behavioral analysis, or by monitoring changes in system files and registry entries

TCP/IP 3-way handshake

SYN - Host A sends request to Host B SYN/ACK - Host B sends back a ACK of Host A's SYN and its on SYN as well ACK - Host A ACK

What is SSH? What port does it use?

Secure Shell (SSH) can be used to encrypt a wide variety of traffic such as telnet and FTP. Encrypts data between host and remote server Provides password and public key authentication Uses port 22.

What is NETSTAT

Shows all active connections on a PC Shows port at the end of a IP address

netstat -a what does it show

Shows all active ports open

What is Telnet and what port does it use?

TCP Port: 23 Command line tool to access a remote system. Used to configure a router or switch. Can be also used to check if ports are open or closed Not secure, don't use over the internet

What are the different types of rootkits

User Mode Rootkits Kernel Mode Rootkits Bootkits Memory-Resident or RAM-based rootkits

Memory Organization (Length)

The length is the size of a data structure or memory block, usually measured in bytes. It represents the amount of memory occupied by a particular piece of data

What are the different types of malware?

Viruses Worms Trojan Horses Spyware Adware Ransomware Rootkits Keyloggers

ARP Tables might contain two different types of entries. What are they, and how are they created?

They contain dynamic and static entries. Dynamic ARP table entries are created when a client makes an ARP request for information that could not be satisfied by data already in the ARP table, Static ARP table entries are those that someone has entered manually using the ARP utility

OSI Model Transport Layer

To ensure data packets arrive in the right order, without losses or errors. Ex: UPD and TCP TCP - commonly used where all data must be intact (file share) UDP - used when retaining all packets is less critical (video streaming)

IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets.

True

What is the difference between a port and a socket?

a port is a number assigned to a process. A socket consists of both a hosts IP address and a process TCP or UDP port

What happens when a router receives a packet with a TTL of 0? a. The router drops the packet and sends an ICMP TTL expired message back to the host. b. The router marks the packet as corrupted and forwards it to the next hop. c. The router attempts to forward the traffic on a local network. d. The router resets the TTL to 128.

a) The router drops the packet and sends an ICMP TTL expired message back to the host

What command is used to see what is in a file

cat

What command is used to see what is in a file quickly

cat

How is TTL field utilized in IPv4

the TTL field indicates the maximum duration that the packet can remain on the network before it is discarded. it represents the number of times a packet can still be forwarded by a router, or the maximum number of router hops it has remaining.The TTL for packets varies and can be configured; it is usually set at 32 or 64. Each time a packet passes through a router, its TTL is reduced by 1. When a router receives a packet with a TTL equal to 0, it discards that packet and sends a TTL expired message via ICMP back to the source host.

How can you determine the manufacturer of a NIC card based on the MAC address?

the first 24 bits

Command to create file on a Linux machine?

touch command.

What is Signature based detection for malware?

uses a unique signature or digital footprint from software programs running on a protected system. Antivirus programs scan the software and compare the signature to know malware signatures

What are the three different types of port number ranges as defined by IANA?

well known ports 0 to 1023 registered ports 1024 to 49151 dynamic and private ports 49152 to 65535


संबंधित स्टडी सेट्स

NSSW Next: Service Reception & Write-up

View Set

IB Computer Science: Topic 1 - System Fundamentals

View Set

1.1 Introduction to Business Management

View Set

Accounting 1 - Chapter 9 TRUE/FALSE

View Set

Determining Author's Purpose/Point of View in Informational Text

View Set

Chapter 32: Management of Patients with Immune Deficiency Disorders

View Set

The Earth-Sun-Moon System Assignment

View Set

Leadership Test #1 (Ch 1-6 10th Edition + Kahoot)

View Set

CHP 5 - Personal Planning and Recruiting

View Set