Technical Cybersecurity Flashcards
The OSI model has 6 layers T/F?
False It has 7
Application layer
Presentation layer
Session layer
Transport layer
Network layer
Datalink layer
Physical layer
Which protocol is used for managing network devices?
SSH
SNMP
HTTPS
SNMP (simple network management protocol) collecting and organising information about managed devices on IP networks and for modifying information to change device behaviour
What protocol is used for managing network traffic?
ICMP
TCP
UDP
ICMP internet control message protocol is a network layer protocol used by network devices to diagnose network communication issues. ICMP is mainly used to determine whether or not data is reaching its intended destination.
What is Data Loss Prevention? DLP
Preventing data exfiltration
Preventing data encryption
Preventing data backups
Preventing data exfiltration - which sends out data through a techniques, dlp combats this.
What is data exfiltration?
Encrypting data
Stealing data
Backing up data
Stealing data - techniques include
Phishing
USB keys
Uploads to cloud
Downloads to insecure devices
Credentials stealing
Which protocol is used for managing network connections?
ICMP
TCP
UDP
TCP keeps the connection going whereas ICMP reports on availability but not connection themselves and UDP does not care about conversation.
What is the difference between symmetric-key and asymmetric-key cryptography?
- Symmetric key uses the same key for encryption and decryption, while asymmetric uses different keys
- Asymmetric is faster than symmetric
- Symmetric is more secure than asymmetric
Symmetric key uses the same key for encryption and decryption, while asymmetric uses different keys
A zero day vulnerability is a vulnerability known to the public and has a patch. T/F
False - zero days have been known for zero days and therefore are unknown and have no patch
The data link layer is responsible for providing end to end connectivity between devices on a network T/F
False - the data link layer is responsible for node to node delivery of data not a physical end to end connection
What is the relationship between the Mitre attack framework and the NiST cyber security framework, CSF?
- Mitre attack provides the technical data for the CSF
- The two frameworks are completely separate and unrelated
- The CSF provides additional information for the tactics and techniques in the mitre attack framework
- The CSF provides the overarching structure of the mitre attack framework
The CSF provides additional information for the tactics and techniques in the mitre attack framework.
The OSI model is a conceptual model that characterises and standardises the communication function of a telecommunication or computing system T/F
True
The presentation layer is responsible for routing data between network devices T/F
False - presentation layer responds to service requests from the application layer and issues service requests to the session layer through a unique presentation service access point PSAP.
What is a key in cryptography?
1. A type of steganography technique
2. A type of encryption algorithm
3. A piece of information used to encrypt or decrypt a message
A piece of information used to encrypt or decrypt a message
What is the difference between steganography and cryptography?
1. Steganography makes the message unreadable, cryptography hides the existence of the message.
2. Steganography provides authentication and cryptography provides confidentiality
3. Steganography hides the existence of the message, cryptography makes the message unreadable.
4. Steganography provides confidentiality and cryptography provides authentication
Steganography hides the existence of the message, cryptography makes the message unreadable.
The transport layer is to ensure end to end delivery true or false
False - the transport layer takes data from the session layer and moves it to the network layer