Elective 1: Prelim Flashcards

1
Q

____ defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.

A

What is Networking?
computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

✓ Sharing of resources such as printers
✓ Sharing of expensive software’s and database
✓ Communication from one computer to another
computer
✓ Exchange of data and information among users via network
✓ Sharing of information over geographically wide areas.

A

Application:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Networking
Computer networks have opened up an entire frontier in the world of computing called the ______

A

client / server model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advantages of Computer Network

A

✓ Increased speed
✓ Reduced cost
✓ Improved security
✓ Centralized software managements
✓ Electronic mail
✓ Flexible access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disadvantages of Computer Network

A

✓High cost of installation
✓Requires time for administration
✓Failure of server
✓Cable faults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Classification of Area by Geography

A

PAN LAN WAN MAN CAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ____ is a computer network organized around an individual person.

A

PERSONAL AREA NETWORK(PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It generally consists of a mobile, a computer, a cell phone or personal digital assistant. __ enables the communication among these devices.

A

PERSONAL AREA NETWORK(PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ___ can be constructed using wireless or cables.

A

PERSONAL AREA NETWORK(PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is a network which is designed to operate over a small physical area such as an office, factory or a group of buildings.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ are easy to design and troubleshoot.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exchange of information and sharing of resources becomes easy because of ___.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In ___ all machines are connected to a single cable.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Different types of topologies such as star, tree, bus, ring, etc Can be used.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is usually a privately owned network.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When network spans over a large distance or when the computers to be connected to each other are at widely separated locations a local area network cannot be used. A ____ is installed.

A

WIDE AREA NETWORK(WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The communication between different users of __ is established using leased telephone lines, satellite links and similar channels.

A

WIDE AREA NETWORK(WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is cheaper and more efficient to use the phone network for the link.

A

WIDE AREA NETWORK(WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Most ___ networks are used to transfer large blocks of data between its users.

A

WIDE AREA NETWORK(WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It is in between LAN & WAN technology that covers the entire city.

A

METROPOLITAN AREA NETWORK (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It uses similar technology as LAN.

A

METROPOLITAN AREA NETWORK (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is derived from two Greek words topo
and logy

A

TOPOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ___ is made up of an interconnection of LAN with limited geographical area.

A

CAMPUS AREA NETWORK (CAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Network equipments such as switches, routers and the transmission media i.e. optical fibers etc are almost entirely owned by the _.

A

CAMPUS AREA NETWORK (CAN)
_campus owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

It can be a single network such as cable TV network, or a measure of connecting a number of LAN’s or a large network so that resources can be shared LAN to LAN as well as device to device.

A

METROPOLITAN AREA NETWORK (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

‘place’

A

topo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

‘study’

A

logy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

used to explain how a network is physically connected and the logical flow of information in the network.

A

TOPOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

describes how devices are connected and interact with each other using communication links.

A

TOPOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

two types of topologies:

A
  • Physical Topology
  • Logical Topology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

describes the way in which the computers or nodes are connected with each other in a computer network.

A

Physical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

It is the arrangement of various elements(link, nodes, etc.), including the device location and code installation of a computer network.

A

Physical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

the physical layout of nodes, workstations, and cables in the network.

A

Physical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

describes the way, data flow from
one computer to another.

A

Logical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

It is bound to a network protocol and defines how data is moved throughout the network and which path it takes.

A

Logical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

devices communicate
Internally.

A

Logical Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

six types of physical topology:

A
  • Bus Topology
  • Ring Topology
  • Star Topology
  • Mesh Topology
  • Tree Topology
  • Hybrid Topology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

simplest kind of topology in which a common bus or channel is used for communication in the network. The _ is connected to various taps and droplines.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In other words, there is only a single transmission line for all nodes.

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Taps are the __, while droplines are the __ connecting the bus with the computer.

A

connectors
cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

___ acts as the backbone of the network, which joins every computer and peripherals in the network. Both ends of the shared channel have line terminators. The data is sent only in one direction and as soon as it reaches the end, the terminator removes the data from the communication line(to prevent signal bounce and data flow disruption).

A

bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

___, each computer communicates to another computer on the network independently. Every computer can share the network’s total bus capabilities. The devices share the responsibility for the flow of data from one point to the other in the network.

A

bus topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

which each computer is connected to exactly two other computers to form the _. The message passing is
unidirectional and circular in nature.

A

Ring topology
_ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

mainly works on a token-based
system and the token travels in a loop in one specific direction.

A

Ring topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

deterministic in nature, i.e., each computer is given access for transmission at a fixed time interval. All the nodes are connected in a closed-loop.

A

Ring topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

if a token is free then the node can capture the token and attach the data and destination address to the token, and then leaves the token for communication. When this token reaches the destination node, the data is removed by the receiver and the token is made free to carry the next data.

A

Ring topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

which all the nodes are connected to a centralized hub.

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  • is a computer network topology in which nodes are interconnected with each other. In other words, direct communication takes place between the nodes in the network.
A

Mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

hub and switch act as a server, and the other connected devices act as clients. Only one input-output port and one cable are required to connect a node to the central device. This topology is better in terms of security because the data does not pass through every node.

A

star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

is a computer network topology in which all the nodes are directly or indirectly connected to the main buscable.

A

Tree topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

two types of Mesh:

A
  1. Full mesh & 2. Partial mesh
44
Q

In which each node is connected to every other node in the network.

A

Full Mesh

45
Q

In which, some nodes are not connected to every node in the network.

A

Partial Mesh

46
Q

is a combination of Bus and Star topology.

A

Tree topology

47
Q

the whole network is divided into segments, which can be easily managed and maintained. There is a main hub and all the other sub-hubs are connected to each other in this topology.

A

Tree topology

47
Q

A _ has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe.

A

successful cybersecurity approach

47
Q

points need to be considered when
selecting a physical topology:

A
  • Ease of Installation.
  • Fault Tolerance.
  • Implementation Cost.
  • Cabling Required.
  • Maintenance Required.
  • Reliable Nature.
  • Ease of Reconfiguration and upgradation.
47
Q
  • In this topology, all topologies are interconnected according to the
    needs to form a hybrid. All the good features of each topology can be used to make an efficient _.
A

Hybrid topology

48
Q

is a computer topology which is a combination of two or more topologies. In practical use, they are the most widely used.

A

Hybrid topology

49
Q

is the practice of protecting systems, networks, and programs from digital attacks.

A

Cybersecurity

50
Q

These _ are usually aimed at _, _, _, _, _. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative

A

_cyberattacks
accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes

51
Q

In an organization, the people, processes, and technology must _ to create an effective
defense from cyber-attacks.

A

complement one another

52
Q

A _ can automate integrations across select Cisco Security products and
accelerate key security operations functions: _, _, and _.

A

_unified threat management system
detection, investigation, and remediation.

53
Q

Cybersecurity Models :

A

CIA Triad

54
Q

is not only about securing information from unauthorized access.

A

Information security

55
Q

is basically the practice of preventing unauthorized _, _, _, _, _, _, _ or _.

A

Information security
_access, use, disclosure, disruption, modification, inspection, recording or destruction of information

56
Q

can be anything like your profile on social media, your data in mobile phone, your biometrics etc.

A

Information

57
Q

spans so many areas like cryptography, mobile computing, forensics, online social media etc.

A

Information security

58
Q

Information Security programs are built around 3 objectives, commonly known as CIA –

A

Confidentiality, Integrity, Availability.

59
Q
  • means that only the authorized individuals/systems can view sensitive or classified information.
A

Confidentiality

59
Q

A primary way to avoid this is to use encryption techniques to safeguard your data so that even if the attacker gains access to your data, he/she will not be able to decrypt it.

A

Confidentiality

60
Q

Encryption standards include

A

AES(Advanced Encryption Standard) and DES (Data Encryption Standard).

61
Q

Another way to protect your data is through a

A

VPN tunnel

61
Q

VPN

A

Virtual Private Network

62
Q

helps the data to move securely over the network

A

VPN

63
Q

making sure that data has not been modified

A

Integrity

64
Q

_ is a failure to maintain data integrity.

A

Corruption of data

65
Q

To check if our data has been modified or not, we make use of a _.

A

hash function

66
Q

This means that the data should be
readily available to its users.

A

Availability

67
Q

This applies to systems and to networks - not simply the data, but the technology necessary to obtain and view the data need to be available.

A

Availability

68
Q

To ensure _, the network/system administrator should _, _, _ and _ in a network

A

availability
maintain hardware, make regular upgrades, have a plan for fail-over and prevent bottleneck

69
Q

The Parkerian Hexad Added The
Following Three Additional Elements:

A

Authenticity, Possession, Utility

70
Q
  • refers to the veracity of the claim of origin or authorship of the information.
A

Authenticity

71
Q

means usefulness

A

Utility

72
Q

Avenues of Attack
- A computer system is attacked for one of two general reasons:

A
  1. It is specifically targeted by an attacker.
  2. It is a target of opportunity.
73
Q

Types of malicious software include:

A
  • Viruses, Trojan horses, logic bombs, spyware, and worms
73
Q
  • _, or _, refers to software that has been designed for some nefarious purpose.
A

Malicious Code
_malware

74
Q

Malware can be fairly complex in its construction.

A
  • Multipartite, polymorphic, and metamorphic
75
Q

The best-known type of malicious code

A

Virus

76
Q

a piece of malicious code that replicates by attaching itself to
another piece of executable code.

A

Virus

77
Q

The first viruses created were of two types:

A
  • Boot sector viruses and program viruses
78
Q

attaches itself to executable files so that it is executed before the program executes.
- Most _ also hide a nefarious purpose, such as deleting the hard drive data.

A

program virus

78
Q

are pieces of code that attempt to penetrate networks and
computer systems.
* Once a penetration occurs, the worm will create a new copy of itself on the penetrated system.
— There is an important distinction:
** _mcode has to attach itself to something else.
** _ code can “survive” on its own.

A

Worms

79
Q

infects the boot sector portion of a floppy disk or hard drive.

A

Boot sector virus

80
Q
  • One of the primary means of avoiding detection by sensors is the use of polymorphic code.
    ** This is code that changes on a regular basis.
    **
    These changes or mutations are designed not to affect the functionality of the code, but rather to mask any signature from detection.
    *** Polymorphic programs can change their coding after each use, making each replicant different from a detection point of view.
A

Polymorphic Malware

81
Q

or simply _, is a piece of software that appears
to do one thing (and may, in fact, actually do that thing) but hides
some other functionality.
* is a standalone program that must be copied and installed by the user.

A

Trojan Horses

82
Q

a form of malware specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality.
* Can do virtually anything that the operating system does
* Designed to avoid the security functions of the operating system to avoid
detection using subversion or evasion
* Can load before the operating system loads, acting as a virtualization layer
* Acts as a form of malware and can exist in firmware and as loadable library modules

A

Rootkits

83
Q

a type of malicious software that is deliberately installed, generally by an authorized user.
* is a piece of code that sits dormant for a period of time until some event invokes its malicious payload.
* _ are difficult to detect.
* They demonstrate the need for a separation of duties and a periodic review of all programs and services that are running on a system.
* They reinforce need for active backups.

A

Logic Bombs

84
Q

is software that “spies” on users, recording and reporting on their activities.
* Typically installed without user knowledge, spyware can do a wide range of activities.
* It can record keystrokes (commonly called keylogging) when the user logs
into specific web sites.
* It can monitor how a user uses a specific piece of software (monitor attempts to cheat at games).

A

Spyware

85
Q

Software that is supported by advertising

A

Adware

86
Q
  • Adware comes in many different forms:
A
  • Legitimate adware
  • Adware in the form of malware
87
Q

The user is aware of the advertising and agrees to the arrangement in return for free use of the software.

A
  • Legitimate adware
88
Q

It is characterized by software that presents unwanted ads.

A
  • Adware in the form of malware
89
Q
  • Hackers create armies of machines by installing malware agents on the machines, which then are called _.
A

zombies

89
Q

One form of malware that is seemingly benign to a user is a botnet zombie.

A

Botnets

90
Q
  • These collections of machines are called _.
A

botnets

91
Q
  • These _ are used to conduct other attacks and to spread spam
    and other malware.
A

zombies machines

92
Q

nothing more than methods used by software developers to ensure that they could gain access to an application even if something were to happen in the future to prevent normal access methods.

A

Backdoors and Trapdoors

93
Q

used to refer to programs that attackers install after gaining unauthorized access to a system to ensure that they can continue to have unrestricted access to the system, even if their initial access method is discovered and blocked.

A

backdoor

94
Q

is a form of malware that performs some action and extracts ransom from a user.
– most common form of _ is one that encrypts a key file or set of files, rendering a system unusable, or dataset unavailable.

A

Ransomware

95
Q

Malware Defenses
* Malware can be defended against in a couple of simple steps:

A
  • Use an antivirus program
  • Keep your software up to date
96
Q

are attacks against a system that can occur at the network level, at the operating system level, at the application level, or at the user level (social engineering).

A

Application-level attacks

96
Q

take advantage of several facts associated with computer applications.

A

Application-level attacks

97
Q
  • Attacks on computer systems and networks can be grouped into two broad categories:
A
  1. Attacks on specific software
  2. Attacks on a specific protocol or service
98
Q

Generally possible because of an oversight in the code (and possibly in the testing of that code) or because of a flaw, or bug, in the code

A

Attacks on specific software

99
Q

Attempt to take advantage of a specific feature of the protocol or service or to use the protocol or service in a manner for which it was not intended

A

Attacks on a specific protocol or service

100
Q

is an attack designed to prevent a system or service from functioning normally.
** Can exploit a known vulnerability in a specific application or operating system
** Can attack features (or weaknesses) in specific protocols or services
** Attempts to deny authorized users access either to specific information or to the computer system or network itself

A

Denial-of-Service Attack

101
Q

A DoS attack employing multiple attacking systems

A

distributed denial-of-service (DDoS) attack.

102
Q

In a specific DoS attack known as a _, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all systems on that network.

A

Smurf attack

103
Q

relies on lies and misrepresentation, which an attacker uses to trick an authorized user into providing information or access the attacker would not normally be entitled to.

A

Social Engineering

104
Q

is when someone examines all the network traffic that passes their NIC, whether addressed for them or not.

A

Sniffing

105
Q

is nothing more than making data look like it has come from
a different source.

A

Spoofing

106
Q
  • generally occurs when attackers are able to
    place themselves in the middle of two other hosts that are communicating.
  • A common method: hijacking.
A

Man-in-the-Middle Attacks

107
Q

used to refer to a more specific type of attack—one in which the encrypted traffic issue is addressed.

A

“man-in-the-middle attack”

108
Q

not generally considered a social engineering issue, nor a security issue for that matter, spam can, however, be a security concern.
– bulk unsolicited e-mail.

A

Spam

109
Q
  • is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users.
  • GOAL: is to obtain from the user information
A

Phishing

110
Q

consists of misdirecting users to fake web sites that have been made to look official.

A

Pharming