EXAM Flashcards

1
Q

What are 3 types of social engineering?

A
  1. Pretexting
  2. Phishing
  3. Vishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between a worm and a virus?

A

A worm doesn’t need to attach itself to an existing program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus?

A

A program that spreads by modifying other programs or files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a DoS attack?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a DoS attack work?

A

Flood the system or network with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a DDOS?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When is a brute force attack most effective?

A

When passwords or encryption codes can be extracted to be attacked off-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of attack is associated with command and control (C&C) centers?

A

Botnets and Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DMZ in networking?

A

Area of the network that is accessible to both internal and external users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Port-Forwarding?

A

Rule-based method of directing traffic between devices on separate networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is safer, using a DMZ or Port-Forwarding?

A

Port-Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does WEP stand for?

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does WPA stand for?

A

Wi-Fi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which wireless security protocol included AES?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 2 protocols associated with 802.11i?

A
  1. TKIP (WPA)
  2. CCMP (WPA2)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an MIC?

A

Message Integrity Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is EAP?

A

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is EAP-TLS associated with?

A

RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the 2 steps with EAP-TLS authentication?

A
  1. Exchange digital certificates with public key
  2. Exchange random number encrypted with public key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a very common type of DoS attack?

A

HTTP flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a TFN? (DDoS)

A

Tribe Flood Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are 3 examples of a TFN attack? (DDoS)

A
  1. UDP flood
  2. TCP SYN flood
  3. Smurf/Fraggle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do classic DoS attacks work?

A

Exploit TCP/IP protocol by sending packets with unexpected header information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a SMURF attack?

A

Flood the host with ICMP PINGS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a Fraggle attack?
Uses UDP to flood the host
26
What is a teardrop attack?
Crafting a packet that contains nonsense (gaps, overlaps) that crashes the victim when trying to reassemble
27
What is spoofing?
Falsifying the address
28
What is a LAND attack?
Local Area Network Denial
29
What filetypes are macro viruses associated with?
Microsoft Office and PDF
30
What is a logic bomb?
Set of computer instructions that lay dormant in a legitimate program until triggered by a specific event
31
What type of malicious program accounts for more than 80% of all malware?
Trojans
32
What is NetBus?
A Backdoor Trojan malware
33
What port does NetBus use?
7777
34
What is a URI?
Uniform Resource Identifier
35
What is a static request on a web server?
Local File System
36
What is a dynamic request on a web server?
Internal or External program
37
What type of web hosting is like an apartment?
Shared Hosting
38
What type of web hosting is like a townhouse?
VPS Hosting
39
What does VPS stand for?
Virtual Private Server
40
What type of web hosting is like owning a house?
Dedicated Servers
41
What is cloud?
Type of distributed computing system (network of datacentres)
42
What are the 3 cloud models?
1. Public 2. Private 3. Hybrid
43
Which cloud model is "serverless"?
Hybrid
44
What is included in troubleshooting documentation?
1. Description of problem 2. Steps taken to determine cause 3. Steps taken to correct issue
45
What are the 3 troubleshooting methods when looking at the OSI model?
1. Bottom-up 2. Top-down 3. Divide and conquer
46
Which layer do you start with in a bottom-up approach?
The physical layer
47
Where do most networking problems reside?
Lower levels
48
What can be assumed if a layer is found to be functioning?
Layers below are functioning
49
What are 4 non-OSI troubleshooting methods?
1. Follow-the-path 2. Substitution 3. Comparison 4. Educated guess
50
Which method of troubleshooting usually complements one of the other approaches?
Follow-the-path
51
What are the 5 command line utilities for diagnosing problems?
1. ipconfig 2. ping 3. netstat 4. tracert 5. nslookup
52
How many hops does tracert attempt before assuming the destination is unreachable?
30
53
What does netstat do?
Displays TCP network connections
54
What does nslookup do?
Directly queries the name server for information on a destination domain
55
How do web servers and browsers communicate?
Through message passing and browser initiated requests
56
How do browsers initiate requests?
Uniform Resource Identifier
57
What is CGI?
Common Gateway Interface
58
What are the 2 largest web servers?
1. Apache 2. Nginx
59
What is a disadvantage of Apache web servers?
Process based
60
What does process based mean?
Each connection to the server requires a thread, leading to overhead
61
What are some advantages for NGINX server?
1. Fast (reverse proxy) 2. Event-based (high performance/scalable) 3. Better for virtual private server
62
What are 3 advantages to Apache server?
1. Enhanced security 2. Strong community support 3. Runs on UNIX, Windows, Linux, Mac OS
63
What is the most popular form of web hosting?
Shared Hosting
64
What business model do cloud services typically rely on?
Pay-as-you-go
65
What does IIS mean?
Internet Information Services
66
What is IIS?
Web server created by Microsoft
67
What is a hypervisor?
Software or hardware that creates and runs Virtual Machines
68
Where is a hypervisor found?
Between the OS and the hardware
69
What is containerization?
Virtualization for applications
70
What kind of architecture does Docker use?
Client-Server