W3 Cyber Security Quiz Flashcards

1
Q

Which 3 levels in OSI Model are usually implemented in the software within the operating system?

A

Application, Presentation, and Session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A netmask can be represented by which two ways?

A

Decimal Numbers (Netmask: 255.255.255.0) and Slash Notation (80.212.212.50/32).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which is the broadcast address in this network: 172.16.24.0/24?

A

172.16.24.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of these protocols reside in Layer 3 - Network in the OSI Model?

A

IP and IPSec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which one of these is a RFC 1918 IP address?

A

172.16.1.30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Shortening an IPv6 address means:

A

Removing a group of only 0’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is spoofing?

A

Falsifying data, making something appear different than they really are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Zero-Trust architecture?

A

A network where all systems/resources need explicit access to be able to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which types of packets can be used to determine if a system is alive on the network?

A

ICMP Echo Request, ICMP Timestamp Request, TCP SYN, TCP ACK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP Scanning can only be used to identify hosts/systems on the LAN ?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a strobe of data?

A

A sudden increase of traffic in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is IDOR?

A

Insecure Direct Object Reference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is SQL injection?

A

It is used to inject malicious code to a database server, through a query.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is best practice in defending against SQL injection?

A

Sanitizing users input in a web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is CSP - Content Security Policy?

A

A strict way of controlling where JavaScript is allowed to be executed from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which order of security protocols is correct, going from least to most secure?

A

WEP, WPA, WPA2, WPA3.

14
Q

SIEM is commonly used to….

A

Do a real-time analysis of security alerts generated by applications, hosts, and network hardware.

14
Q

Classifications of incidents should generally be according to….

A

Category, sensitivity, criticality.

14
Q

The 6 stages of PICERL are….

A

Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned.

15
Q

In which phase of PICERL is blocking attackers usually done?

A

Containment

16
Q
A
17
Q
A
18
Q
A
19
Q
A
20
Q
A
20
Q
A