intro to cyber security

Ace your homework & exams now with Quizwiz!

Wireless signals

Transmission is achieved by using infrared, microwave, or radio waves through the air.

an organization It department reports that their web server is receiving an abnormally high number of web page request from different locations simultaneously

DDoS

true or false? Certain areas of the electromagnetic spectrum can be used without a permit.

True

Network Name (SSID)

Used to identify the WLAN. All devices that wish to participate in the WLAN must have the same SSID.

Which organization is responsible for testing wireless LAN devices?

Wi-Fi Alliance

Category 5e

the most common wiring used in a LAN. The cable is made up of 4 pairs of wires that are twisted to reduce electrical interference.

risk management

the process of identifying and assessing risk to reduce the impact of threats and vulnerability

how do Cisco ISE and TrustSec work

they enforce access to network resources by creating role-based access control policies

SSID

Name assigned to a NETWORK.

what protocol is used to collect information about traffic traversing a network

Netflow

Observed data

This is captured by recording the actions of individuals, such as location data when using cell phones.

Volunteered data

This is created and explicitly shared by individuals, such as social network profiles. This type of data might include video files, pictures, text, or audio files.

Inferred data

This is data such as a credit score, which is based on analysis of volunteered or observed data.

names giving to a database where all cryptocurrency transactions are recorded

Block chain

SSID Broadcast

Determines if the SSID will be broadcast to all devices within range. By default, set to Enabled.

Network mode

Determines the type of technology that must be supported. For example, 802.11b, 802.11g, 802.11n or Mixed Mode.

True or False? If you have devices on your wireless network that are using a variety of different 802.11 standards, then you should set your network to the highest standard to get the best throughput.

False

True or false? Wi-Fi, Bluetooth, and cordless phones all use the same frequency ranges.

False

DHCP/ ICMPV6

IP address information what network i belong to address of default gateway IP address of DNS server

What measurement is used to indicate thousands of bits per second?

KBPS

SSID

Service Set Identifier

Standard Channel

Specifies the channel over which communication will occur. By default, this is set to Auto to allow the access point (AP) to determine the optimum channel to use.

Coaxial cable

an inner wire surrounded by a tubular insulating layer, that is then surrounded by a tubular conducting shield. Most coax cables also have an external insulating sheath or jacket.

what is the last stage of pen test

analysis and reporting

internet

best path through network

examples of cracking encrypted password

brute force attack Spraying Rainbow tables dictionary attacks

Fiber-optic cables

can be either glass or plastic with a diameter about the same as a human hair and it can carry digital information at very high speeds over long distances. Fiber-optic cables have a very high bandwidth, which enables them to carry very large amounts of data.

transport

communication between various devices

a port scan returns a closed response what does this mean?

connections to the port will be denied

network access

controls hardware and media throughout the network

Application

data to user encoding and dialogue control.

today, there are single security appliances that will solve all the network security needs of an organization t/f

false

with careful planning and consideration, some risk can be completely eliminated t/f

false

what is the best way to avoid getting spyware on a machine

install software only from trusted websites

which tech creates a security token that allows a user to log in to a desired web application using credentials from a social media website

open authorization

categories of security measures and controls

policy and procedures

in networking, what name is given to the identifier at both ends of a transmission to ensure that the right data is passed to the correct application

port number

Optical signals

ransmission is achieved by converting the electrical signals into light pulses.

Electrical signals

transmission is achieved by representing data as electrical pulses on copper wire.


Related study sets

Mkrt 301 chap 3 Test and Quiz Questions

View Set

Word Religions- Indigenous Religions

View Set

Essential Cell Biology, Chapter 11, Membrane Stricture

View Set

Chapter 16: Therapy and Treatment

View Set

Bone growth, remodeling and repair

View Set

6th Grade Chapter 5 Test Practice

View Set