cyber security intro Flashcards
What is the correct order of a TCP three-way handshake?
Syn, syn-ack, ack
Which command is used to display files in a directory under the Windows
OS?
dir
What is a good example of a valid internal IP address?
- 192.168.21.05/24
- 24 = the number of subnets that can be on a class c address
- How many host are in a class c network - 254 usable with one being the gateway 255
What is a good example of UDP protocol usage?
- Movie streaming
- Udp - no connection needed
- Tcp - needs a connection
- TCP is a connection-oriented protocol, whereas UDP is a connectionless protocol.
Which of the following Windows accounts has the weakest permissions?
- Guest
What is hping3?
- A Linux tool that sends multiple packets and can creates a DoS attack.
- If you type this in kali linux it will create havoc hping3 -1 –flood 192.168.1.23
What are the differences between Information Security and Cyber Security?
- Cyber security protects against all types of cyber crimes, while information security protects the information itself.
What could be the subnet mask of a class A network?
- Example:
- A = 255.0.0.0
- B = 255.255.0.0
- C = 255.255.255.0
- Professor example:
- 255.0.0.0
- 255.255.255.254
- 255.255.255.0
- 255.255.0.0
What is the role of a DNS server?
- Translating common names to IP addresses.
What is the difference between a hub and a router?
- A hub operates in layer 1, while a router operates in layer 3.
- Layer1: PhysicalLayer. Layer2: Data LinkLayer. Layer3: NetworkLayer. Layer4: TransportLayer. Layer5: SessionLayer. Layer6: PresentationLayer. Layer7: ApplicationLayer.
Which of the following is not an example of a DDoS attack?
- Man in the middle
Cyber defense services are needed for:
- Detection, prevention, recovery
What is the best password option that can be set to harden one’s account?
- 99CSULBCru!SeIsDBest
- 2FA - two factor authentication
- MFA - multi factor authentication
You open Google Chrome and search for a new Razer mouse. The computer
reacts slowly. What type of hardware might be causing this?
- ~Network card
- ~Motherboard
- ~CPU
- =All answers above are possible
Which of the following is not a physical control?
- Anti-Virus
What is the purpose of the DMZ?
- A sub-network that exposes an organization’s external facing service.
What is the purpose of the Ping command?
- Send packets to check if a host is reachable.
Which of the following is a DDoS tool?
- LOIC - Low Orbit Ion Canon
- DoS - an attack from a single source
- DDoS - an attack from multiple sources
Ping of Death is an example of which attack?
- DoS attack
If someone hacked into a Facebook manager account and demand payment or they will release sensitive information to the public, what type of hacker would probably be involved?
- Black Hat
Which of the following statements is FALSE? Choose one
- MAC addresses change according to the network, while IP addresses are fixed per computer and have a unique identifier.
- False
- IP addresses operate in the third layer, while MAC addresses operate in the second layer of the OSI model.
- True
- Which of the following statements is FALSE? Choose one. * MAC addresses change according to the network, while IP addresses are fixed per computer and have a unique identifier.
- ~An example of an IP address is 192.168.0.1 and an example of a MAC
- address is 00-50-56-C0-00-08. * 00:11:22:33:44:55
What is the difference between a virus and a worm?
- Worms self-replicate but viruses do not.
Select the terms below that make up the CIA triad? Choose all correct
answers.
- confidentiality, integrity, availability
Which of the following is the main concept of MITM?
- When an attacker is between two other hosts and intercepts the communication.