Quiz 1 Flashcards

1
Q

Who was the main figure at Bletchley park that lead the effort to crack the Enigma codes and created the Bombe?

A

Alan Turing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

He is considered one of the first hackers but was mostly a phreaker and adept in the art of social engineering

A

Kevin Mitnick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

She studied under Charles Babbage and is the first person known to conceive of a reprogrammable computing device

A

Ada Lovelace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

He is considered, by many, to be the creator of the internet because he lead the Advanced Research Project Agency that created ARPAnet, a precursor to the internet

A

Larry Roberts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

He was another pivotal figure at Bletchley Park and his contributions include traffic analysis, a precursor to what Facebook and Google to with metadata today.

A

Gordon Welchman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The electro-mechanical rotor cipher used to encrypt day-to-day messages to the German troops

A

Enigma Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The first fully functional electric computer developed at the University of Pennsylvania

A

ENIAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This was the first operating system developed with security in mind from the ground up

A

Multics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The two developments that shrunk computers and allowed for the decentralization of computing

A

Transistor and microprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This pre-computer device was developed by Charles Babbage to help compute Bernoulli Numbers

A

Differencing Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What medium were the German codes being broadcast over during WWII?

A

Analog Radio Waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The main storage medium used to transfer large amounts of data between facilities during the cold war era

A

Magnetic Tape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARPAnet was the first to implement these protocols that we still use for many internet communications today; handshakes included

A

TCP / IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Robert Metcalf developed these standards that allow machines to talk to each other over a LAN

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Many of the problems we see with internet security today, stem from the early use of these standards rather than adopting industry standards that had been well vetted

A

“De facto”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Tech Model Railroad club came up with this early “hacker dictionary” that is still in use today

A

The Jargon File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

These were the two decades in which the primary development of the internet took place

A

1970s and 1980s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

She is credited with finding the first computer “bug”

A

Grace Hopper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

She is credited with conceptualizing and creating the first interpreter to ease the burdens of programming

A

Grace Hopper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This was the first computer security paper that detailed the need for security measures beyond that of physically locking down access to the machines

A

The Rand Report R-609

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This term refers to an attacker gaining access to a target’s network

A

Infiltrate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This term refers to going through the garbage trying to find PII and/or confidential information

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This type of exploit is one for which there, currently, is no patch from the vendor

A

Zero day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Where were access numbers written for some of the first hackers to find and utilize?

A

Phone Booths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What network joined ARPAnet in 1986; the time when it was first referred to as “The Internet”

26
Q

A substitution cipher is also somtimes referred to after this historical figure that achieved his encryption by shifting all letters 3 places to the right

27
Q

This general type of encryption uses the same key to encrypt and decrypt

28
Q

This algorithm uses the binary representation of data

29
Q

This cipher uses the numerical location of each letter within the alphabet

30
Q

This early encryption method was developed by the Spartans and involved wrapping a papyrus around a rod of a certain size

31
Q

What does the C of the CIA triangle of Information Security stand for?

A

Confidentiality

32
Q

What do the I and A of the CIA triangle stand for?

A

Integrity and Availability

33
Q

Something that has value to an individual and organization is known as this in technical terms

34
Q

This specific person or entity that carries out an exploit is known as this

A

Threat Agent

35
Q

What is the password software that we spoke of in class and can be utilized by an attacker to perpetrate pass the hash or ticket attacks?

36
Q

When speaking of encryption, this is the original [human readable] version of a message

37
Q

When speaking of encryption, this is the encrypted version of a message; not human readable

A

Ciphertext or cryptogram

38
Q

This term refers to the time it would take for cryptanalysis to successfully decrypt a message when the key is unknown

A

Work Factor

39
Q

Asymmetric encryption is known as this type of encryption because two different keys are involved

A

Public Key

40
Q

This type of cryptography involves hiding messages inside of something else, such as an image

A

Steganography

41
Q

These people used non-standard hieroglyphs to create the first known form of encryption

42
Q

This type of attack against a crypto system involves trying every possible combination for a given character set

A

Brute Force

43
Q

During WWII, this group of Native Americans used their language in addition to new code words to create the only non-computer generated encryption to not be broken during either world war

A

Navajo Code Talkers

44
Q

With private key encryption, when delivering the key, you want to deliver it by a different means from the ciphertext; also known as this…

A

Out of band

45
Q

This term refers to the ability for PKI to enforce online transactions; the user can be held accountable with reasonable assurance that they carried out the transaction

A

Nonrepudiation

46
Q

This command can be used to test network connectivity as well as tell if a system is active on the network

47
Q

This command shows you every hop a packet takes along its way to the destination

A

Traceroute

48
Q

This command can be used to retrieve the MAC address of a client on the network; whether or not it is replying to PING requests

49
Q

This command allows you to see all the ports actively connected or listening on the local machine

50
Q

We utilized this command to remotely scan another machine on the network and find information like open ports and potentially detect the OS

A

nmap / zenmap

51
Q

This was the group we had to add our account to for it to become an administrator on the domain

A

Domain Admins

52
Q

This is the name of Microsoft’s server role that allows for establishing a domain

A

Active Directory

53
Q

This is the commandline environment we have been running commands in

A

powershell

54
Q

This is the term that is used to refer to a server that is part of a domain, but NOT a domain controller

A

Member Server

55
Q

This is the built-in Windows virtualization platform we are utilizing in class

56
Q

When setting what all will be entailed in the assessment, you are setting this

57
Q

This should be the final step in your risk assessment

A

Documentation

58
Q

This should be the 2nd step of a risk assessment

A

Identify Risks

59
Q

You should consider these individuals in most risk assessments as they are often the biggest threat

A

Insiders / your own employees

60
Q

If you have to follow rules set by a governing body because of the type of data you process, then it is said you must be in this…

A

Compliance