Cyberspace Fundamentals Flashcards

1
Q

List two pieces of information used for targeting in the Logical Network Layer of cyberspace.

A

Internet Protocol (IP) & Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the three key considerations when planning cyberspace operations.

A

Payload, Vulnerability, and Access (P.V.A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe three classes of payloads in cyberspace and the effects each payload achieves.

A

1) Exploit-Gain access
2) Persistence-Maintain Access
3) Actions on Objects-Effects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List each of the four vulnerability classes and give an example of each class.

A

1) Technical-Software Flaws
2) Human Factor-Social engineering, insider threat
3) Misconfiguration-guest account unsecure
4) Supply Chain-Malicious hardware/software introduced in supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly