Midterm Flashcards

1
Q

These enforce a series of rules defining what kind of network traffic is allowed and what is not allowed

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The act of verifying the identity of a particular person

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anything a person would use to access a network (device type)

A

Host device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a threat and an attack?

A

Threat: potential violation of security
■ Does not need to have occurred

Attack: actions that take advantage of potential threats
■ People causing the attack are called attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three goals of security

A

Protect
● Try to stop the attack from happening

Detect
● Quickly identify when an attack is happening

Respond & Recovery
● Stop, assess, repair
● Maintain functionality during an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is anti-virus not perfect?

A

Anti-viruses have to be manually updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This part of the operating system creates and manages files and directories

A

File system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Passwords are stored on a system as these, which vary based on operating system

A

Hashes; keeps passwords from being readily available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a system authenticate a user password attempt?

A

The system compares the attempt to a stored hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Systems on a network that include files and/or programs in use by multiple people on or outside a network

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Set of devices, software, and cables that enables the exchange of information

A

Networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe two network topologies

A

Bus - Every component is connected to a single line, with “taps” for each
component
Advantages: quick to deploy, cheap
■ Disadvantage: lots of collisions, unreliable, a break in the line causes
the network to fail, performance is directly related to number of
components and usage
■ Example: Cable internet

Ring - Every component has 2
connections – a left and a right
side
■ Basically a bus with a
connection back around to
the beginning
■ Disadvantages:
Performance is generally
poor, not scalable, break in
one connection causes
complete network failure

Star
● Each node is connected to a
central point
● Most common physical topology
(Ethernet)
● Advantages: fast, non-central
failure does not bring down the
network, scalable
● Disadvantages: used to be very
expensive, but not anymore,
single point of failure, lots of
cabling

Mesh
● Advantages: self-healing, failure
tolerant, potentially fast
● Disadvantages: no known route
traversal, difficult to control and
filter traffic
● Example: Wireless ad-hoc
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This device inspects the data of a packet to see if it is malicious in nature

A

IDS/IPS
(intrusion detection/prevention system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What occurs when two hosts try to use the same connection at the same time

A

Collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 3 types of authentication and an example of each?

A

● Something you know
e.g. Password/passphrase

● Something you have
e.g. Smart card, USB key, your phone

● Something you are
e.g. Biometrics (retina, fingerprint, DNA, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the term used if 2 or more types of authentication are in use?

A

Two-factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of CSMA/CD?

A

Carrier Sense Multiple Access with Collision Detection

Method to detect collisions before they occur in ethernet cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What was the first operating system and service pack to include a firewall enabled by default?

A

Windows XP Server Pack 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is CIA and why is it important?

A

Confidentiality
Only those with sufficient privileges and a demonstrated need may access certain information

Integrity
Quality or state of being whole, complete, or uncorrupted

Availability
Enables user to access information without interference or obstruction and in a useable format

Traits of well-implemented security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This part of the operating system
determines when to allocate programs,
processes, and threads to the processor

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the best method of cracking a password and why?

A

Brute-force attacks
■ Will try every possible character combination until it finds the password
■ This method can be extremely slow based on password length and complexity
■ It will always find the password in some amount of time
■ Most systems now limit number of password guesses to thwart brute-force attacks

Dictionary Attacks
■ Functions by trying a list of pre-defined potential passwords, one after another
■ Very fast method
■ Can be useful if you know the user and can compile an intelligent list of potential
passwords
■ If the password is not an exact match to the list, the attack will fail

Hybrid Attacks
■ Uses a list like the dictionary attack, but is able to detect slight variations
■ Example: if “hello” is in the list, but the password is “Hello” or “HellO”, the
dictionary attack will fail but the hybrid attack will succeed
■ It is not as fast as the dictionary attack because it has more variables to account for

Rainbow Tables
■ They are not coffee tables painted with bright colors
■ They are actual data tables containing every single hash value for every possible password possibility up to a certain number of characters
■ You simply take the hash value you have extracted from the system and search for it – once it is found in the table, you will have the password
■ You must have the Rainbow Table for the specific type of hash you are trying to crack
■ Rainbow Tables for even a small amount of characters can be quite large in size and so storage and searching can be an issue

Adversary-in-the-middle attacks formerly known as person-in-the-middle
■ If a system is authenticating to a network or accessing resources on another system, it will be passing hashes over the network to authenticate
■ MITM attacks attempt to sniff and gather these hashes in transit
■ Example: The program Cain and Abel uses a process called ARP poisoning to route the traffic between the two systems through your computer. It then sniffs the traffic for the hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are some advantages and disadvantages of wireless networks?

A

Reliability, range, accessibility (swings either way)

23
Q

What is responsible for address at Layer 2 - Data Link?

A

MAC address (media access control)

24
Q

What happens when there is not enough RAM for memory?

A

Paging allows for memory to be “swapped” out to the hard disk when there is not enough RAM to hold everything attempting to be stored

25
Q

What is the purpose of POST & BIOS on a system?

A

Power On Self Test
- Process performed by firmware immediately after a computer or other electronic devices is powered on
- verifies the integrity of the BIOS, system memory and size, and CPU

Basic Input/Output System
- A type of firmware used during the booting (POST) process
- initializes and tests system hardware (POST) and loads an operating system from a boot device

26
Q

This model is a set of guidelines used to standardize network processes

A

TCP/IP, OSI

27
Q

What are some examples of layer 6 - presentation?

A

jpg, doc, txt

28
Q

The smallest unit of processing that can be scheduled

A

Thread

29
Q

How is a digital signature applied?

A

You sign a message with your private key

Anyone who wants to read the message can verify that you created it by verifying it with your public key

30
Q

At which layer does the TCP protocol function?

A

Transport

31
Q

An executable set of code

A

Program

32
Q

This command is used to test the reachability of a host and measure round-trip time for messages sent from a host to a destination machine

A

ping

33
Q

Explain the three way handshake

A

First step in establishing a reliable connection
■ Purpose is to allow hosts to exchange starting sequence numbers and test the connection
● Sender sends a SYN (synchronize) to the Receiver saying what port it wants to connect to and the sequence number of the Sender’s first packet
● Receiver sends back a SYN/ACK (synchronize/acknowledge) saying it is ready for the Sender’s next packet and the sequence number of the
Receiver’s first packet
● Sender responds ACK (acknowledge) that it received the Receiver’s packet and the connection is established
● Then data exchange begins

34
Q

What process do motherboards post-2014 and Macs use at boot and why?

A

UEFI (Unified Extensible Firmware Interface); ability to boot from disks larger than 2TB

35
Q

What is the purpose of PAR?

A

Positive acknowledgement and retransmission
To determine when packets are dropped after the 3-way handshake

36
Q

This network device broadcasts all network traffic to everyone connected to the device

A

Hub

37
Q

Why are hubs not as used and what device replaces them on modern networks?

A

Switches are a better option to avoid broadcasting network traffic to everyone

38
Q

What type of user account has complete power over a system?

A

Administrator (Windows)
Root (MacOS, Linux)

39
Q

This part of any computer system is responsible for managing hardware and software resources

A

OS

40
Q

What does the TCP sliding window do?

A

Tells how much data can be sent at a time based on how busy the receiving host is

41
Q

What are the 3 pieces of hardware where data resides on a computer and how long do each of them store it? Rank in order of speed

A

CPU -> RAM -> hard drive

42
Q

What is the difference between dynamic and static IP addresses?

A

Dynamic - Assigned via DHCP (Dynamic Host Configuration Protocol)
Addresses changed based on length of lease

Static - Manually assigned by the user or system administrator
Can only be changed manually

43
Q

What are ports?

A

Port numbers allow traffic to be sent to different programs and applications (“services”) within a system

Like a PO Box Number on a computer where the zip code is the IP address

44
Q

A single system in a network that connects to the internet

A

Gateway

45
Q

What is UDP and when is it used?

A

User datagram protocol
When speed&raquo_space; reliability

46
Q

What are the four layers of the TCP/IP model?

A

Application, transport, internet, network interface

47
Q

What is the difference between public and private IP addresses and what is the purpose of each?

A

Public IP addresses
– purchased from Internet Service Providers
(ISPs)

Private IP addresses
– used on an internal network to share a single
public IP address with multiple devices

48
Q

What type of encryption uses the same key for encryption and decryption?

A

Symmetric

49
Q

How does the internet translate between human-readable URLs and IP addresses of web servers holding the web pages?

A

DNS
domain name system

50
Q

What do routers use to associate IP address to MAC addresses?

A

ARP (Address Resolution Protocol) table

51
Q

What was the first version of Windows designed from a security standpoint and what went wrong?

A

Windows vista; it was too secure to use

52
Q

Describe how public-key encryption functions

A

The public key is accessible to everyone and is used to decrypt a message sent from you

53
Q

What is one way of protecting against an attack on a password?

A

Maximum attempts

54
Q

Why do we secure our wireless networks and what security protocol do we use to do this?

A

Wireless networks aren’t encrypted
WPA2