Kahoot Flashcards
In a packet, this is used to identify a set of noes that must be traversed by the packet along its path to a destination.
Padding
Routing header
flags
Type of service
Routing Header
No Operation instructions that slide the program execution to the next memory address are known as _______
Trespassing
Reverse Shells
Buffer Overflows
NOP sleds
NOP Sleds
______ Prevents senders from denying they sent the encrypted message.
confidentiality
Authentication
Integrity
Nonrepudiation
Nonrepudiation
A Man in the Middle, machine in the middle, monkey in the middle (MITM) attack is when a/n ____________
perpetrator sets up a listener
attacker sits between two parties who think they are directly communicating
shell session is established on a connection initiated from a remote machine
adversary attempts to masquerade as a legitimate entity
attacker sits between two parties who think they are directly communicating
A hacker takes a device and hides malware within it hoping someone finds the device. This is best known as _____
Road Apples
Phishing
Trojan Horse
Rootkit
Road Apple
______ proves the contents of a message have not been changed since it was sent
Confidentiality
Nonrepudiation
Authentication
Integrity
Integrity
________ will show you the number of lines from the bottom of a file.
End
Word Count
Head
Tail
Tail
What is it when any access to information is granted to someone who shouldnt have access to it, such as redentials.
Sensitive data exposure
Broken access control
Privilege escalation
Security misconfiguration
Sensitive data exposure
This vulnerability has been around since iOS 7. Those in Bluetooth range could reprogram your iPhone.
Pegasus
iMessage
Heartbleed
AirDrop
AirDrop
_____ happens when invalid data is sent to the application, intending to make it do something that it shouldn’t
Broken Authentication
SQL injection
Multi-byte NOP-sled
Buffer overflow
SQL Injection
ARP is a protocol that enables network communications and translates IPv4 to IPv6 (T/F)
False
The OG PING Utility created in 1983, was used by DARPA to test performance and was called the Packet Internet Groper (T/F)
True
Comparable to a classic firewall; has a choke point router filtering in bound traffic before the web server & firewall.
Retina 3.0
Retina
Network Based security
Nessus
Retina
______ may make forecasting the address to where a program jumps undo able.
Address space layout randomization
Stack randomization
Obfuscation
NOP sleds
Stack Randomization
Netcat functions as a back-end tool that alows data across a client and server once the connection is established (T/F)
True
Which rootkit infects your hard drive or system BIOS and may even be used to intercept disk-written data?
Bootloader Rootkit
Memory Rootkit
Kernel mode rootkit
Hardware or firmware rootkits
Hardware or Firmware rootkits
NDP supplements several IPv4 protocols, ie ARP and ICMP redirect. However it has not improved ________.
Parameter discovery
Inverse neighbor Discovery
Prefix Discovery
Host Discovery
Host Discovery
There are four categories of IDS. What are they?
VMIDS, NIDS, HIDS, PIDS
NIDS, VMIS, TIDS, PIDS
VMIDS, NIDS, HIPS, TIPS
NIDS, WMIDS, HIDS, PINS
NIDS, VMIS, TIDS, PIDS
_____ is a device that monitors activity to identify questionable or even hostile events
Router
Switch
IDS
IPS
IDS