Practice 1 Copy Flashcards
The class A private IP address range contains the addresses from
10.0.0.0 to 10.255.255.255.255
The class B private IP address range contains the addresses from
172.16.0.0 to 172.31.255.255
The class C private IP address range contains the addresses from
192.168.0.0 to 192.168.255.255
The APIPA/link-local autoconfiguration range is from
169.254.0.0 to 169.254.255.255
Any workstation running unauthorized software that directs the device to participate in a DDoS attack as part of a larger botnet
Zombie
A ________ is a network of computers that have been compromised by a Trojan, rootkit, or worm malware
Botnet
What is an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim
Phishing
Which attacks focus on a targeted set of people, not just an indiscriminate large group of random people
Spear Phishing
An email-based or web-based form of phishing that targets senior executives or wealthy individuals
Whaling
_______ is a social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services
Vishing
Which rule states that an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site
3-2-1 backup
Which backup rotation scheme is widely used to combine full and incremental backups to reduce backup time and enhance storage security
Grandfather-father-son
A scripting language based on Microsoft’s Visual Basic programming language
VBScript
A general-purpose programming language that can develop many different kinds of applications
Python
Python scripts are saved using the_______ extension
.py
A _______ file is used for a shell script and its first line always begins with #!/bin/bash that designates the interpreter
.sh
A ________ is a file that contains a list of commands to be read and executed by the shell in Linux and macOS
Shell Script
A scripting language that is designed to create interactive web-based content and web apps
Javascript
JavaScript is stored in a _____ file
.js
What stores a single character, such as J, D, or Z
Character
What stores a group of characters, such as Hello, PYTHON, or JasonDion?
String
What stores a value of TRUE (1) or FALSE (0)?
Boolean
What stores a whole number, such as 21, 143, or 1024
Integer
The concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities
Least Privilege
A security framework that requires all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data
Zero-Trust
An approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information
Defense in Depth
A set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used
acceptable use policy (AUP)
(AUP)
acceptable use policy
A specific identifier that contains a value that cannot be changed within the program
Constant
When a computer repeats the task until a condition is met
Loop
What is used to control the flow within a computer program or script, usually based on some logic condition
A Branch
A placeholder in a script containing a number, character, or string of characters
Variables
A standalone malware computer program that replicates itself to spread to other computers
Worm
Malicious software designed to infect computer files or disks when it is activated. May be programmed to carry out other malicious actions, such as deleting files or changing system settings
Virus
A type of malware that looks legitimate but can take control of your computer. Designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network
Trojan
The most common form of a trojan is
Remote Access Trojan (RAT)
RAT
Remote Access Trojan
Allows an attacker to control a workstation or steal information remotely
Remote Access Trojan (RAT)
A type of malware designed to deny access to a computer system or data until a ransom is paid
Ransomware
Often used to inject the attacker into the conversation path between the two parties. The act of disguising a communication from an unknown source as being from a known, trusted source
Spoofing
A social engineering technique to gain access to a building by following someone unaware of their presence
Tailgating
Consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly
Brute-Force
WPA
Wi-Fi Protected Access
Usually uses to install an image on the computer over the network. Allows a workstation to boot from a server on a network before booting the local hard drive’s operating system
Preboot eXecution Environment (PXE)
The primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization
Group Policy Editor (gpedit.msc)
PXE
Preboot eXecution Environment
CHAP
Challenge-Handshake Authentication Protocol
A protocol that is used to authenticate a user or network host to an authenticating entity
Kerberos