Cybersecurity Quiz (W3 Schools)
Which one of these is a RFC 1918 ip address?
172.16.1.30
Which is the broadcast address in this network: 172.16.24.0/24
172.16.24.255
A netmask can be represented by which two ways?
Decimal Numbers (Netmask: 255.255.255.0) and Slash Notation (80.212.212.50/32)
SIEM is commonly used to
Do a real-time analysis of security alerts generated by applications, hosts and network hardware
Which types of packets can be used to determine if a system is alive on the network?
ICMP Echo Request, ICMP Timestamp Request, TCP SYN, TCP ACK
Which of these protocols reside in Layer 3 - Network in the OSI Model?
IP and IPSec
What is IDOR?
Insecure Direct Object Reference
What is SQL injection?
It is used to inject malicious code to a database server, through a query
NMAP Timing options (-T) can be used to to avoid detection by
Limit speed on how fast hosts are scanned
The 6 stages of PICERL are:
Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
Shortening an IPv6 address means:
Removing a group of only 0's
What is best practice in defending against SQL injection?
Sanitizing users input in a web application
ARP Scanning can only be used to identify hosts/systems on the LAN
True
Which order of security protocols is correct, going from least to most secure?
WEP, WPA, WPA2, WPA3
To be able to detect and block specific file types/documents to be blocked from downloading from the internet, with a firewall, you need:
A Next-Generation Firewall with layer 7 features
What is Zero-Trust architecture?
A network where all systems/resources need explicit access to be able to communicate
What is CSP - Content Security Policy?
A strict way of controlling where javascript is allowed to be executed from
What is a strobe of data?
A sudden increase of traffic in the network
Which 3 levels in OSI Model are usually implemented in the software within the operating system?
Application, Presentation, Session
Classifications of incidents should generally be according to
Category, sensitivity, criticality
In which phase of PICERL is blocking attackers usually done?
Containment
A cookie can not be used to control a users session/state
False. Cookies are often used for tracking sessions
You need an IDS (Intrusion Detection System) in addition to IPS (Intrusion Prevention System) to be able to both detect and prevent access
False. IPS is also able to detect if positioned correctly in the network
Using the same strong password, with high entropy, on multiple sites is good practice
False. If one site is breached/hacked and stores passwords in clear text, your password is now in hackers hands
What is spoofing?
Falsifying data, making something appear different than they really are
