Network Security Flashcards

1
Q

SQL injection targets this layer

A

application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

buffer overflow

A

injects too much info into a form which causes the app to crash, targets application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

man in the middle attacks target these layers

A

various

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VLAN hopping targets this layer

A

data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DoS/DDoS targets this layer

A

transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ping of death and ping flood targets this layer

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SMURF DDoS attack targets these layers (2)

A

network and transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

deauth attack targets this layer

A

presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RPC exploit targets this layer

A

session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how to mitigate viruses

A

antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how to mitigate worms

A

don’t download attachments, antivirus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how to mitigate trojans

A

firewall software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how to mitigate rootkits

A

avoid opening suspicious emails, don’t download cracked software, keep OS updated, antimalware w/rootkit detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how to mitigate ransomware

A

scan emails for known malware strains, keep firewalls and endpoint protections up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how to mitigate a zero day attack

A

a fix/patch needs to be released

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CIA - confidentiality

A

access to information should be granted on a need-to-know basis

17
Q

CIA - integrity

A

information should be kept the same from source to destination

18
Q

CIA - availability

A

a company’s services should be available

19
Q

authentication

A

who and what are you (1st step)

20
Q

authorization

A

what are you allowed to do (2nd step)

21
Q

accounting

A

keeps track of what you do (3rd step)

22
Q

team responsible for defending and securing an org’s IT infrastructure and assets

A

blue security team

23
Q

a person who hacks a system without fully understanding what they’re doing (perhaps with downloaded scripts) is a

A

script kiddie

24
Q

term is used to describe the likelihood and impact of a threat exploiting a vulnerability

25
Q

group of security PROFESSIONALS who simulate attacks on a network to identify vulnerabilities

26
Q

method or tool used to take advantage of a vulnerability

27
Q

group in an org that observes penetration testing

A

white team

28
Q

when both red and blue teams engage and debrief, they are considered

A

purple team