CSULB-12A Introduction To Cybersecurity EXAM REVIEW

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Give an example of a valid internal IP address.

192.168.1.3

What is an example of a Subnet Mask Class C?

255.2555.0.0

What are the Seven layers of the OSI model?

ACRONYM: All People Seem To Need Data Processing. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer

What is one difference between APT and Script Kiddies?

APT funded by government and Script kiddes small attacks

Name something that is not a physical control.

Antivirus

What is the purpose of a DHCP server?

Assign an IP address to hosts

If someone hacked into a Facebook manager account and demand payment or they will release sensitive information to the public, what type of hacker would probably be involved?

Blackhat

What would be an example of a "Strong" password option that can be set to harden one's account?

Combination of uppercase and lowercase letters, numbers and special symbols

What are the three terms that make up the CIA triad?

Confidentiality, Integrity, and Availability.

Name two aspects of the CIA triad does evidence preservation help ensure?

Confidentiality, integrity

What is the purpose of the Ping command?

Connectivity, Reachability.

What is the role of a DNS server?

Convert domain into IP addresses

What are two differences between Information Security and Cyber Security?

Cyber Security focuses on online threats as first line of defense. Information Security deals with the protection of data from any threat. Cybersecurity strikes against Cyber crimes, cyber frauds and law enforcement. Information Security focuses on securing data and Cyber security is protecting against cyber criminals

What is the purpose of the DMZ?

DMZ is a subnetwork that sits between an internal network and an external network.

Three Cyber defenses are needed for:

Detection, Prevention, Recovery

Three things Cyber defenses is needed for:

Detection, Prevention, Recovery

Ping of Death is an example of which attack?

DoS

When a web server that conducts online transactions crashes by a single attacker, what type of network attack occurred?

DoS

What is a name of a tool that can be used in order to initiate a MITM attack?

Ettercap

Name a wireless attack that involves impersonation of a Wifi Access Point?

Evil Twin

MAC addresses change according to the network, while IP addresses are fixed per computer and have a unique identifier?

False

What is MAC flooding?

Floods the MAC address table to have the switch act like a hub

Name a Windows account with the weakest permission/access?

Guest

What is the difference between a hub and a router?

Hub is on Physical Layer (1) , Router is on Network Layer (3)

What is the main concept of MITM?

Intercept traffic between two people without being detected

Name a popular DDoS tool.

Low Orbit Ion Cannon (LOIC)

What is the difference between an IP address and an MAC address?

MAC is physical IP is logical

Name an attack that is not a DDoS attack?

MITM

What is the purpose of the kernel in the operating system?

Manage hardware and resources.

What is the purpose of DiD?

Multilayer defense

Which network adapter setting assigns an IP address for the VM client machine from the physical host machine?

NAT

What two types of network configurations would allow a VM machine to reach the Internet from its host computer?

NAT or Bridge

What is true about threads and processes?

Process own memory space. Threads use the memory of the process they belong to.

You open Google Chrome and search for a new mouse. The computer reacts slowly. Name three types of hardware might be causing this?

Processor, Ram , Memory.

What is the purpose of a server operating system, such as Windows Server?

Provide services and information by sharing resources and distribution.

If someone downloads a malicious program that encrypts data and demands payment for its restoration, what type of malware is used?

Ransomeware

What is the correct order of a TCP three-way handshake?

SYN, SYN-ACK, ACK (Synchronize. Synchronize/Acknowledge, Acknowledge)

What are the advantages of using virtualization?

Safe testing environment for testing and isolated. Isolated and in a sandbox and threat investigation. They allow multiple operating systems (OS) environments to exist simultaneously on the same machine.

Which type of attack exploits a vulnerability in the TCP/IP 3-way handshake process?

TCP SYN flood (a.k.a. SYN flood)

What is the difference between TCP and UDP?

TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol.

What is the Windows Registry?

The windows registry holds all the configuration settings for the applications and os

What is a good example of UDP protocol usage?

VOIP

Which wireless protocol should not be used when setting up a wireless network because it is the weakest?

WEP

Which network analysis tool cannot be used for flooding a host with network traffic?

Wireshark

What is the difference between a virus and a worm?

Worms are replicated. Viruses are triggered by users.

Name the command to display files in a directory under the Windows OS?

dir

Name a tool that can be used to flood a host with traffic?

hping3


Set pelajaran terkait

Sociology ch. 8 Social Stratification, class and inequality

View Set

Appropriate Quotation - MLA Style

View Set

Exam #5: The Central Nervous System

View Set

BUS 345 : strategic Management ch1

View Set

New CompTIA A+ Core 1 220-1001 Test Questions - Killtest

View Set

Questions from Practice Tests - Life

View Set

Domain 1.0 - Windows Systems / Features / Command Line

View Set

Comprehensive Dietetic Examination

View Set

FIN3403 - Chapter 10, 12, 13, & 14 Concept Questions

View Set