W3 Cyber Security Quiz Flashcards
Which 3 levels in OSI Model are usually implemented in the software within the operating system?
Application, Presentation, and Session.
A netmask can be represented by which two ways?
Decimal Numbers (Netmask: 255.255.255.0) and Slash Notation (80.212.212.50/32).
Which is the broadcast address in this network: 172.16.24.0/24?
172.16.24.255
Which of these protocols reside in Layer 3 - Network in the OSI Model?
IP and IPSec.
Which one of these is a RFC 1918 IP address?
172.16.1.30
Shortening an IPv6 address means:
Removing a group of only 0’s.
What is spoofing?
Falsifying data, making something appear different than they really are.
What is Zero-Trust architecture?
A network where all systems/resources need explicit access to be able to communicate.
Which types of packets can be used to determine if a system is alive on the network?
ICMP Echo Request, ICMP Timestamp Request, TCP SYN, TCP ACK.
ARP Scanning can only be used to identify hosts/systems on the LAN ?
True
What is a strobe of data?
A sudden increase of traffic in the network
What is IDOR?
Insecure Direct Object Reference
What is SQL injection?
It is used to inject malicious code to a database server, through a query.
What is best practice in defending against SQL injection?
Sanitizing users input in a web application.
What is CSP - Content Security Policy?
A strict way of controlling where JavaScript is allowed to be executed from.