Cyber Flashcards

(26 cards)

1
Q

Whats the CIA Triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIA Triad - What is confidentiality?

A

Ensuring that information is accessible only to those authorised to have access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad - What is Integrity?

A

Protecting information from being altered by unauthorised parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CIA Triad - What is Availability?

A

Ensuring that information and resources are available when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the OSI 7 layer model?

A

The OSI Model describes how data travels from a physical medium to an application on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whats are the 7 layers in the OSI model?

A

Physical, Data Link, Network, Transport, Session, Presentation, Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the physical layer do?

A

Deals with the hardware and transmission of raw data (e.g., cables, switches)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the Data Link layer do?

A

Handles MAC addresses, switches, and error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Network layer do?

A

Routes data using IP addresses (e.g., routers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Transport layer do?

A

Ensures reliable data transfer with protocols like TCP and UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the Session layer do?

A

Manages sessions or connections between applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does the Presentation layer do?

A

Translates data formats (e.g., encryption, compression)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Application layer do?

A

Interfaces with the end-user (e.g., HTTP, FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the TCP/IP Stack?

A

Link, Internet, Transport, and Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name 4 common networking protocols

A

HTTP/HTTPS, FTP/SFTP, SSH, DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Public Key Cryptography?

A

Involves a pair of keys: a public key (shared openly) and a private key (kept secret)

17
Q

What is SQL Injection?

A

Exploiting user input fields to inject malicious SQL commands

18
Q

What is Cross-Site Scripting (XSS)?

A

Injecting malicious scripts into web pages viewed by other users

19
Q

What is Cross-Site Request Forgery (CSRF)?

A

Forcing a user to execute unwanted actions on a web application where they’re authenticated.

20
Q

What is the 5 steps to a Penetration attack?

A

Reconnaissance (Gathering target into), Scanning (Identifying open ports), Exploitation (attempting the exploit), Post-Exploitation (assessing the impact), Reporting.

21
Q

3 Types of Attacks?

A

Social Engineering, DDoS (Distributed Denial), Man-in-the-Middle

22
Q

What is the windows registry?

A

A hierarchical database storing configuration settings and options for the operating system and applications

23
Q

What is the windows Event Logs?

A

It logs events like logins, system errors, application failures, and security events

24
Q

Name some forensics tools

A

Autopsy for disk and file system analysis; Volatility for memory analysis

25
What does RAM Analysis do?
Focuses on extracting volatile information such as active processes, open network connections, loaded drivers, and encryption keys
26
What does the 7 layer OSI model do?
It describes how data travels from a physical medium to an application on a network