Fifth Class Test Review Flashcards

1
Q

_____ Allows a single hardware platform to provide resources for multiple servers

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a language or format that allows two computers to talk to each other

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What inspect detects and blocks traffic based on policies or parameters

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the command in Linux to see all files in a directory

A

LS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What device connect computers and devices

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is also know as a logical address

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three cyber security principals

A

CIA (Confidentiality Integrity Availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the least restricted account in Linux

A

Root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In windows what is the most restricted account

A

Guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the subnet mask for a class a network

A

255.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 5 layers of the defense in depth model

A
Physical
Network
Host
Application
Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of malware pretends to be a legitimate computer program

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A firewall is an example of what type of control

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What device connects networks

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name the tree virtual box networks mode

A

Internal
NAT
Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is also know as the brain of a computer

A

CPU

17
Q

What is the purpose of a server operating system

A

To deploy and manage services

18
Q

DNS sec is used to prevent what type of an attack

A

DNS poisoning

19
Q

What is a security flaw that can be exploited by an attacker

A

Vulnerability

20
Q

How are vulnerabilities represented in the NVD (National Vulnerability Database)

A

CVE (Common Vulnerabilities and Exposures)

21
Q

What is the numbering system used in the MAC address

A

Hexadecimal

22
Q

What type of addresses are used on a switch network

A

MAC (Media Access Control)

23
Q

What is responsible for translating an IP address to domains and vise versa

A

DNS (Domain Name System)

24
Q

What type of malware encrypts your files and demands a payment

A

Ransomware

25
Q

What type of cyber-attack includes phishing

A

Social engineering

26
Q

What type of control is your company’s security awareness program.

A

Administrative

27
Q

From smallest to largest what are the three classes of sub domain

A

Class C
Class B
Class A

28
Q

What service allocates IP address information

A

DHCP (Dynamic Host Configuration Protocol)

29
Q

What is the IP address for local host

A

127.0.0.1