Third Class Test Review Flashcards

1
Q

What is also known as a physical address

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does MAC address stand for

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What layer of DiD model is between Physical and Host layer

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does C.I.A. stand for

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three type of hackers

A

White Hat / Ethical
Gray Hat
Black Hat / Unethical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name all 4 types of Cyber attacks we have learned about

A

Social engineering
Malware
DoD
DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of malware spreads across the network and does not require human interaction

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of cyber attack is an email tricking you into clicking on a link

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Type of malware disguised as a legitimate program

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of software removes malicious programs from a computer

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of device blocks traffic based on rules and protocols

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of device uses the MAC address to move data around

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Class A, B & C which one is the smallest

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the subnet masks for all 3 classes

A

Class A 255.0.0.0
Class B 255.255.0.0
Class C 255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What numbering system uses 16 possible choices

A

Hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a weakness in a computer system that allows an attacker to break in

A

Vulnerability

17
Q

What does CVE stand for

A

Common Vulnerabilities and Exposures

18
Q

What does NVD stand for

A

National Vulnerabilities Database