EXAM Flashcards

1
Q

What are 3 types of social engineering?

A
  1. Pretexting
  2. Phishing
  3. Vishing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between a worm and a virus?

A

A worm doesn’t need to attach itself to an existing program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus?

A

A program that spreads by modifying other programs or files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a DoS attack?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does a DoS attack work?

A

Flood the system or network with traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a DDOS?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When is a brute force attack most effective?

A

When passwords or encryption codes can be extracted to be attacked off-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of attack is associated with command and control (C&C) centers?

A

Botnets and Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a DMZ in networking?

A

Area of the network that is accessible to both internal and external users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Port-Forwarding?

A

Rule-based method of directing traffic between devices on separate networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which is safer, using a DMZ or Port-Forwarding?

A

Port-Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does WEP stand for?

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does WPA stand for?

A

Wi-Fi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which wireless security protocol included AES?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 2 protocols associated with 802.11i?

A
  1. TKIP (WPA)
  2. CCMP (WPA2)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an MIC?

A

Message Integrity Check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is EAP?

A

Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is EAP-TLS associated with?

A

RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the 2 steps with EAP-TLS authentication?

A
  1. Exchange digital certificates with public key
  2. Exchange random number encrypted with public key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a very common type of DoS attack?

A

HTTP flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a TFN? (DDoS)

A

Tribe Flood Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are 3 examples of a TFN attack? (DDoS)

A
  1. UDP flood
  2. TCP SYN flood
  3. Smurf/Fraggle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How do classic DoS attacks work?

A

Exploit TCP/IP protocol by sending packets with unexpected header information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a SMURF attack?

A

Flood the host with ICMP PINGS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a Fraggle attack?

A

Uses UDP to flood the host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a teardrop attack?

A

Crafting a packet that contains nonsense (gaps, overlaps) that crashes the victim when trying to reassemble

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is spoofing?

A

Falsifying the address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a LAND attack?

A

Local Area Network Denial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What filetypes are macro viruses associated with?

A

Microsoft Office and PDF

30
Q

What is a logic bomb?

A

Set of computer instructions that lay dormant in a legitimate program until triggered by a specific event

31
Q

What type of malicious program accounts for more than 80% of all malware?

A

Trojans

32
Q

What is NetBus?

A

A Backdoor Trojan malware

33
Q

What port does NetBus use?

A

7777

34
Q

What is a URI?

A

Uniform Resource Identifier

35
Q

What is a static request on a web server?

A

Local File System

36
Q

What is a dynamic request on a web server?

A

Internal or External program

37
Q

What type of web hosting is like an apartment?

A

Shared Hosting

38
Q

What type of web hosting is like a townhouse?

A

VPS Hosting

39
Q

What does VPS stand for?

A

Virtual Private Server

40
Q

What type of web hosting is like owning a house?

A

Dedicated Servers

41
Q

What is cloud?

A

Type of distributed computing system (network of datacentres)

42
Q

What are the 3 cloud models?

A
  1. Public
  2. Private
  3. Hybrid
43
Q

Which cloud model is “serverless”?

A

Hybrid

44
Q

What is included in troubleshooting documentation?

A
  1. Description of problem
  2. Steps taken to determine cause
  3. Steps taken to correct issue
45
Q

What are the 3 troubleshooting methods when looking at the OSI model?

A
  1. Bottom-up
  2. Top-down
  3. Divide and conquer
46
Q

Which layer do you start with in a bottom-up approach?

A

The physical layer

47
Q

Where do most networking problems reside?

A

Lower levels

48
Q

What can be assumed if a layer is found to be functioning?

A

Layers below are functioning

49
Q

What are 4 non-OSI troubleshooting methods?

A
  1. Follow-the-path
  2. Substitution
  3. Comparison
  4. Educated guess
50
Q

Which method of troubleshooting usually complements one of the other approaches?

A

Follow-the-path

51
Q

What are the 5 command line utilities for diagnosing problems?

A
  1. ipconfig
  2. ping
  3. netstat
  4. tracert
  5. nslookup
52
Q

How many hops does tracert attempt before assuming the destination is unreachable?

A

30

53
Q

What does netstat do?

A

Displays TCP network connections

54
Q

What does nslookup do?

A

Directly queries the name server for information on a destination domain

55
Q

How do web servers and browsers communicate?

A

Through message passing and browser initiated requests

56
Q

How do browsers initiate requests?

A

Uniform Resource Identifier

57
Q

What is CGI?

A

Common Gateway Interface

58
Q

What are the 2 largest web servers?

A
  1. Apache
  2. Nginx
59
Q

What is a disadvantage of Apache web servers?

A

Process based

60
Q

What does process based mean?

A

Each connection to the server requires a thread, leading to overhead

61
Q

What are some advantages for NGINX server?

A
  1. Fast (reverse proxy)
  2. Event-based (high performance/scalable)
  3. Better for virtual private server
62
Q

What are 3 advantages to Apache server?

A
  1. Enhanced security
  2. Strong community support
  3. Runs on UNIX, Windows, Linux, Mac OS
63
Q

What is the most popular form of web hosting?

A

Shared Hosting

64
Q

What business model do cloud services typically rely on?

A

Pay-as-you-go

65
Q

What does IIS mean?

A

Internet Information Services

66
Q

What is IIS?

A

Web server created by Microsoft

67
Q

What is a hypervisor?

A

Software or hardware that creates and runs Virtual Machines

68
Q

Where is a hypervisor found?

A

Between the OS and the hardware

69
Q

What is containerization?

A

Virtualization for applications

70
Q

What kind of architecture does Docker use?

A

Client-Server