Technical Cybersecurity Flashcards

1
Q

The OSI model has 6 layers T/F?

A

False It has 7

Application layer
Presentation layer
Session layer
Transport layer
Network layer
Datalink layer
Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which protocol is used for managing network devices?

SSH
SNMP
HTTPS

A

SNMP (simple network management protocol) collecting and organising information about managed devices on IP networks and for modifying information to change device behaviour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocol is used for managing network traffic?

ICMP
TCP
UDP

A

ICMP internet control message protocol is a network layer protocol used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Data Loss Prevention? DLP

Preventing data exfiltration
Preventing data encryption
Preventing data backups

A

Preventing data exfiltration - which sends out data through a techniques, dlp combats this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data exfiltration?
Encrypting data
Stealing data
Backing up data

A

Stealing data - techniques include
Phishing
USB keys
Uploads to cloud
Downloads to insecure devices
Credentials stealing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which protocol is used for managing network connections?
ICMP
TCP
UDP

A

TCP keeps the connection going whereas ICMP reports on availability but not connection themselves and UDP does not care about conversation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between symmetric-key and asymmetric-key cryptography?

  1. Symmetric key uses the same key for encryption and decryption, while asymmetric uses different keys
  2. Asymmetric is faster than symmetric
  3. Symmetric is more secure than asymmetric
A

Symmetric key uses the same key for encryption and decryption, while asymmetric uses different keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A zero day vulnerability is a vulnerability known to the public and has a patch. T/F

A

False - zero days have been known for zero days and therefore are unknown and have no patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The data link layer is responsible for providing end to end connectivity between devices on a network T/F

A

False - the data link layer is responsible for node to node delivery of data not a physical end to end connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the relationship between the Mitre attack framework and the NiST cyber security framework, CSF?

  1. Mitre attack provides the technical data for the CSF
  2. The two frameworks are completely separate and unrelated
  3. The CSF provides additional information for the tactics and techniques in the mitre attack framework
  4. The CSF provides the overarching structure of the mitre attack framework
A

The CSF provides additional information for the tactics and techniques in the mitre attack framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The OSI model is a conceptual model that characterises and standardises the communication function of a telecommunication or computing system T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The presentation layer is responsible for routing data between network devices T/F

A

False - presentation layer responds to service requests from the application layer and issues service requests to the session layer through a unique presentation service access point PSAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a key in cryptography?
1. A type of steganography technique
2. A type of encryption algorithm
3. A piece of information used to encrypt or decrypt a message

A

A piece of information used to encrypt or decrypt a message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the difference between steganography and cryptography?
1. Steganography makes the message unreadable, cryptography hides the existence of the message.
2. Steganography provides authentication and cryptography provides confidentiality
3. Steganography hides the existence of the message, cryptography makes the message unreadable.
4. Steganography provides confidentiality and cryptography provides authentication

A

Steganography hides the existence of the message, cryptography makes the message unreadable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The transport layer is to ensure end to end delivery true or false

A

False - the transport layer takes data from the session layer and moves it to the network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The network layer is responsible for managing the logical addressing of devices on the network, as well as determining the most efficient path for data to travel between devices. True or false

A

True

17
Q

The application layer is the highest layer in the OSI model true or false

A

True

18
Q

The OSI model is a protocol suite that can be used to transmit data over a network? True or false

A

False - it is a hypothetical model not used to transmit data

19
Q

What is the significance of the attack matrix of the mitre attack framework?
1. It provides a roadmap of the implementation of security controls
2. It provides a comprehensive view of the tactics and techniques used by threat actors
3. It summarises the results of risk assessments
4. It lists all the vulnerabilities that need to be addressed

A
  1. It provides a comprehensive view of the tactics and techniques used by threat actors
20
Q

What is a common method used by threat actors to establish a C2 channel with an infected machine?

A

Using a beaconing technique to initiate communication with the C2 server