Cybersecurity Quiz (W3 Schools)

Ace your homework & exams now with Quizwiz!

Which one of these is a RFC 1918 ip address?

172.16.1.30

Which is the broadcast address in this network: 172.16.24.0/24

172.16.24.255

A netmask can be represented by which two ways?

Decimal Numbers (Netmask: 255.255.255.0) and Slash Notation (80.212.212.50/32)

SIEM is commonly used to

Do a real-time analysis of security alerts generated by applications, hosts and network hardware

Which types of packets can be used to determine if a system is alive on the network?

ICMP Echo Request, ICMP Timestamp Request, TCP SYN, TCP ACK

Which of these protocols reside in Layer 3 - Network in the OSI Model?

IP and IPSec

What is IDOR?

Insecure Direct Object Reference

What is SQL injection?

It is used to inject malicious code to a database server, through a query

NMAP Timing options (-T) can be used to to avoid detection by

Limit speed on how fast hosts are scanned

The 6 stages of PICERL are:

Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned

Shortening an IPv6 address means:

Removing a group of only 0's

What is best practice in defending against SQL injection?

Sanitizing users input in a web application

ARP Scanning can only be used to identify hosts/systems on the LAN

True

Which order of security protocols is correct, going from least to most secure?

WEP, WPA, WPA2, WPA3

To be able to detect and block specific file types/documents to be blocked from downloading from the internet, with a firewall, you need:

A Next-Generation Firewall with layer 7 features

What is Zero-Trust architecture?

A network where all systems/resources need explicit access to be able to communicate

What is CSP - Content Security Policy?

A strict way of controlling where javascript is allowed to be executed from

What is a strobe of data?

A sudden increase of traffic in the network

Which 3 levels in OSI Model are usually implemented in the software within the operating system?

Application, Presentation, Session

Classifications of incidents should generally be according to

Category, sensitivity, criticality

In which phase of PICERL is blocking attackers usually done?

Containment

A cookie can not be used to control a users session/state

False. Cookies are often used for tracking sessions

You need an IDS (Intrusion Detection System) in addition to IPS (Intrusion Prevention System) to be able to both detect and prevent access

False. IPS is also able to detect if positioned correctly in the network

Using the same strong password, with high entropy, on multiple sites is good practice

False. If one site is breached/hacked and stores passwords in clear text, your password is now in hackers hands

What is spoofing?

Falsifying data, making something appear different than they really are


Related study sets

CITI Model: Research Involving children

View Set

Ch. 15 study guide, The secondary assessment

View Set

NUR 305 Test 6 practice questions

View Set

Chapter 5 Neuroanatomy, Neurophysiology, behavior and Neurotransmitters, receptors, activity

View Set