Practice 1 Copy Flashcards

1
Q

The class A private IP address range contains the addresses from

A

10.0.0.0 to 10.255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The class B private IP address range contains the addresses from

A

172.16.0.0 to 172.31.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The class C private IP address range contains the addresses from

A

192.168.0.0 to 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The APIPA/link-local autoconfiguration range is from

A

169.254.0.0 to 169.254.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any workstation running unauthorized software that directs the device to participate in a DDoS attack as part of a larger botnet

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ________ is a network of computers that have been compromised by a Trojan, rootkit, or worm malware

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which attacks focus on a targeted set of people, not just an indiscriminate large group of random people

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An email-based or web-based form of phishing that targets senior executives or wealthy individuals

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______ is a social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which rule states that an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site

A

3-2-1 backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which backup rotation scheme is widely used to combine full and incremental backups to reduce backup time and enhance storage security

A

Grandfather-father-son

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A scripting language based on Microsoft’s Visual Basic programming language

A

VBScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A general-purpose programming language that can develop many different kinds of applications

A

Python

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Python scripts are saved using the_______ extension

A

.py

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _______ file is used for a shell script and its first line always begins with #!/bin/bash that designates the interpreter

A

.sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ________ is a file that contains a list of commands to be read and executed by the shell in Linux and macOS

A

Shell Script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A scripting language that is designed to create interactive web-based content and web apps

A

Javascript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

JavaScript is stored in a _____ file

A

.js

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What stores a single character, such as J, D, or Z

21
Q

What stores a group of characters, such as Hello, PYTHON, or JasonDion?

22
Q

What stores a value of TRUE (1) or FALSE (0)?

23
Q

What stores a whole number, such as 21, 143, or 1024

24
Q

The concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities

A

Least Privilege

25
Q

A security framework that requires all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data

A

Zero-Trust

26
Q

An approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information

A

Defense in Depth

27
Q

A set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used

A

acceptable use policy (AUP)

28
Q

(AUP)

A

acceptable use policy

29
Q

A specific identifier that contains a value that cannot be changed within the program

30
Q

When a computer repeats the task until a condition is met

31
Q

What is used to control the flow within a computer program or script, usually based on some logic condition

32
Q

A placeholder in a script containing a number, character, or string of characters

33
Q

A standalone malware computer program that replicates itself to spread to other computers

34
Q

Malicious software designed to infect computer files or disks when it is activated. May be programmed to carry out other malicious actions, such as deleting files or changing system settings

35
Q

A type of malware that looks legitimate but can take control of your computer. Designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network

36
Q

The most common form of a trojan is

A

Remote Access Trojan (RAT)

37
Q

RAT

A

Remote Access Trojan

38
Q

Allows an attacker to control a workstation or steal information remotely

A

Remote Access Trojan (RAT)

39
Q

A type of malware designed to deny access to a computer system or data until a ransom is paid

A

Ransomware

40
Q

Often used to inject the attacker into the conversation path between the two parties. The act of disguising a communication from an unknown source as being from a known, trusted source

41
Q

A social engineering technique to gain access to a building by following someone unaware of their presence

A

Tailgating

42
Q

Consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly

A

Brute-Force

43
Q

WPA

A

Wi-Fi Protected Access

44
Q

Usually uses to install an image on the computer over the network. Allows a workstation to boot from a server on a network before booting the local hard drive’s operating system

A

Preboot eXecution Environment (PXE)

45
Q

The primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization

A

Group Policy Editor (gpedit.msc)

46
Q

PXE

A

Preboot eXecution Environment

47
Q

CHAP

A

Challenge-Handshake Authentication Protocol

48
Q

A protocol that is used to authenticate a user or network host to an authenticating entity