Cyberspace Fundamentals Flashcards

1
Q

List two pieces of information used for targeting in the LNL

A

IP Adress

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Three key considerations for cyberspace operations

A

Payload is the capability that performs action on the target

Vulnerability is the weakness of the target

Access is the physical connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe 3 classes of payload

A

Exploit (gain access)

Persistence (maintain access)

Actions on objective (effects)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List the four vulnerability classes and give an example of each

A

Technical- software flaws

Human factor- social engineering, insider threat

Misconfiguration- guest account unsecure

Supply chain- malicious hardware/ software introduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe how data is moved within the logical network layer

A

Data is segregated into packets then moved between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly