Elective 1: Prelim Flashcards

1
Q

____ defined as the interconnection of two or more computers. It is done to enable the computers to communicate and share available resources.

A

What is Networking?
computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

✓ Sharing of resources such as printers
✓ Sharing of expensive software’s and database
✓ Communication from one computer to another
computer
✓ Exchange of data and information among users via network
✓ Sharing of information over geographically wide areas.

A

Application:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Networking
Computer networks have opened up an entire frontier in the world of computing called the ______

A

client / server model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advantages of Computer Network

A

✓ Increased speed
✓ Reduced cost
✓ Improved security
✓ Centralized software managements
✓ Electronic mail
✓ Flexible access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disadvantages of Computer Network

A

✓High cost of installation
✓Requires time for administration
✓Failure of server
✓Cable faults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Classification of Area by Geography

A

PAN LAN WAN MAN CAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ____ is a computer network organized around an individual person.

A

PERSONAL AREA NETWORK(PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It generally consists of a mobile, a computer, a cell phone or personal digital assistant. __ enables the communication among these devices.

A

PERSONAL AREA NETWORK(PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ___ can be constructed using wireless or cables.

A

PERSONAL AREA NETWORK(PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is a network which is designed to operate over a small physical area such as an office, factory or a group of buildings.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ are easy to design and troubleshoot.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exchange of information and sharing of resources becomes easy because of ___.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In ___ all machines are connected to a single cable.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Different types of topologies such as star, tree, bus, ring, etc Can be used.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It is usually a privately owned network.

A

LOCAL AREA NETWORK (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When network spans over a large distance or when the computers to be connected to each other are at widely separated locations a local area network cannot be used. A ____ is installed.

A

WIDE AREA NETWORK(WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The communication between different users of __ is established using leased telephone lines, satellite links and similar channels.

A

WIDE AREA NETWORK(WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It is cheaper and more efficient to use the phone network for the link.

A

WIDE AREA NETWORK(WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Most ___ networks are used to transfer large blocks of data between its users.

A

WIDE AREA NETWORK(WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

It is in between LAN & WAN technology that covers the entire city.

A

METROPOLITAN AREA NETWORK (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It uses similar technology as LAN.

A

METROPOLITAN AREA NETWORK (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is derived from two Greek words topo
and logy

A

TOPOLOGY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ___ is made up of an interconnection of LAN with limited geographical area.

A

CAMPUS AREA NETWORK (CAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Network equipments such as switches, routers and the transmission media i.e. optical fibers etc are almost entirely owned by the _.

A

CAMPUS AREA NETWORK (CAN)
_campus owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
It can be a single network such as cable TV network, or a measure of connecting a number of LAN’s or a large network so that resources can be shared LAN to LAN as well as device to device.
METROPOLITAN AREA NETWORK (MAN)
24
'place'
topo
25
'study'
logy
26
used to explain how a network is physically connected and the logical flow of information in the network.
TOPOLOGY
27
describes how devices are connected and interact with each other using communication links.
TOPOLOGY
27
two types of topologies:
* Physical Topology * Logical Topology
28
describes the way in which the computers or nodes are connected with each other in a computer network.
Physical Topology
29
It is the arrangement of various elements(link, nodes, etc.), including the device location and code installation of a computer network.
Physical Topology
29
the physical layout of nodes, workstations, and cables in the network.
Physical Topology
30
describes the way, data flow from one computer to another.
Logical Topology
31
It is bound to a network protocol and defines how data is moved throughout the network and which path it takes.
Logical Topology
32
devices communicate Internally.
Logical Topology
33
six types of physical topology:
* Bus Topology * Ring Topology * Star Topology * Mesh Topology * Tree Topology * Hybrid Topology
34
simplest kind of topology in which a common bus or channel is used for communication in the network. The _ is connected to various taps and droplines.
Bus Topology
34
In other words, there is only a single transmission line for all nodes.
Bus Topology
34
Taps are the __, while droplines are the __ connecting the bus with the computer.
connectors cables
35
___ acts as the backbone of the network, which joins every computer and peripherals in the network. Both ends of the shared channel have line terminators. The data is sent only in one direction and as soon as it reaches the end, the terminator removes the data from the communication line(to prevent signal bounce and data flow disruption).
bus
36
___, each computer communicates to another computer on the network independently. Every computer can share the network's total bus capabilities. The devices share the responsibility for the flow of data from one point to the other in the network.
bus topology
37
which each computer is connected to exactly two other computers to form the _. The message passing is unidirectional and circular in nature.
Ring topology _ring
37
mainly works on a token-based system and the token travels in a loop in one specific direction.
Ring topology
38
deterministic in nature, i.e., each computer is given access for transmission at a fixed time interval. All the nodes are connected in a closed-loop.
Ring topology
39
if a token is free then the node can capture the token and attach the data and destination address to the token, and then leaves the token for communication. When this token reaches the destination node, the data is removed by the receiver and the token is made free to carry the next data.
Ring topology
40
which all the nodes are connected to a centralized hub.
Star topology
41
- is a computer network topology in which nodes are interconnected with each other. In other words, direct communication takes place between the nodes in the network.
Mesh topology
41
hub and switch act as a server, and the other connected devices act as clients. Only one input-output port and one cable are required to connect a node to the central device. This topology is better in terms of security because the data does not pass through every node.
star topology
42
is a computer network topology in which all the nodes are directly or indirectly connected to the main buscable.
Tree topology
43
two types of Mesh:
1. Full mesh & 2. Partial mesh
44
In which each node is connected to every other node in the network.
Full Mesh
45
In which, some nodes are not connected to every node in the network.
Partial Mesh
46
is a combination of Bus and Star topology.
Tree topology
47
the whole network is divided into segments, which can be easily managed and maintained. There is a main hub and all the other sub-hubs are connected to each other in this topology.
Tree topology
47
A _ has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe.
successful cybersecurity approach
47
points need to be considered when selecting a physical topology:
* Ease of Installation. * Fault Tolerance. * Implementation Cost. * Cabling Required. * Maintenance Required. * Reliable Nature. * Ease of Reconfiguration and upgradation.
47
* In this topology, all topologies are interconnected according to the needs to form a hybrid. All the good features of each topology can be used to make an efficient _.
Hybrid topology
48
is a computer topology which is a combination of two or more topologies. In practical use, they are the most widely used.
Hybrid topology
49
is the practice of protecting systems, networks, and programs from digital attacks.
Cybersecurity
50
These _ are usually aimed at _, _, _, _, _. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative
_cyberattacks accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes
51
In an organization, the people, processes, and technology must _ to create an effective defense from cyber-attacks.
complement one another
52
A _ can automate integrations across select Cisco Security products and accelerate key security operations functions: _, _, and _.
_unified threat management system detection, investigation, and remediation.
53
Cybersecurity Models :
CIA Triad
54
is not only about securing information from unauthorized access.
Information security
55
is basically the practice of preventing unauthorized _, _, _, _, _, _, _ or _.
Information security _access, use, disclosure, disruption, modification, inspection, recording or destruction of information
56
can be anything like your profile on social media, your data in mobile phone, your biometrics etc.
Information
57
spans so many areas like cryptography, mobile computing, forensics, online social media etc.
Information security
58
Information Security programs are built around 3 objectives, commonly known as CIA –
Confidentiality, Integrity, Availability.
59
- means that only the authorized individuals/systems can view sensitive or classified information.
Confidentiality
59
A primary way to avoid this is to use encryption techniques to safeguard your data so that even if the attacker gains access to your data, he/she will not be able to decrypt it.
Confidentiality
60
Encryption standards include
AES(Advanced Encryption Standard) and DES (Data Encryption Standard).
61
Another way to protect your data is through a
VPN tunnel
61
VPN
Virtual Private Network
62
helps the data to move securely over the network
VPN
63
making sure that data has not been modified
Integrity
64
_ is a failure to maintain data integrity.
Corruption of data
65
To check if our data has been modified or not, we make use of a _.
hash function
66
This means that the data should be readily available to its users.
Availability
67
This applies to systems and to networks - not simply the data, but the technology necessary to obtain and view the data need to be available.
Availability
68
To ensure _, the network/system administrator should _, _, _ and _ in a network
availability maintain hardware, make regular upgrades, have a plan for fail-over and prevent bottleneck
69
The Parkerian Hexad Added The Following Three Additional Elements:
Authenticity, Possession, Utility
70
- refers to the veracity of the claim of origin or authorship of the information.
Authenticity
71
means usefulness
Utility
72
Avenues of Attack - A computer system is attacked for one of two general reasons:
1. It is specifically targeted by an attacker. 2. It is a target of opportunity.
73
Types of malicious software include:
* Viruses, Trojan horses, logic bombs, spyware, and worms
73
* _, or _, refers to software that has been designed for some nefarious purpose.
Malicious Code _malware
74
Malware can be fairly complex in its construction.
- Multipartite, polymorphic, and metamorphic
75
The best-known type of malicious code
Virus
76
a piece of malicious code that replicates by attaching itself to another piece of executable code.
Virus
77
The first viruses created were of two types:
* Boot sector viruses and program viruses
78
attaches itself to executable files so that it is executed before the program executes. - Most _ also hide a nefarious purpose, such as deleting the hard drive data.
program virus
78
are pieces of code that attempt to penetrate networks and computer systems. * Once a penetration occurs, the worm will create a new copy of itself on the penetrated system. --- There is an important distinction: ** _mcode has to attach itself to something else. ** _ code can “survive” on its own.
Worms
79
infects the boot sector portion of a floppy disk or hard drive.
Boot sector virus
80
- One of the primary means of avoiding detection by sensors is the use of polymorphic code. *** This is code that changes on a regular basis. *** These changes or mutations are designed not to affect the functionality of the code, but rather to mask any signature from detection. *** Polymorphic programs can change their coding after each use, making each replicant different from a detection point of view.
Polymorphic Malware
81
or simply _, is a piece of software that appears to do one thing (and may, in fact, actually do that thing) but hides some other functionality. * is a standalone program that must be copied and installed by the user.
Trojan Horses
82
a form of malware specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality. * Can do virtually anything that the operating system does * Designed to avoid the security functions of the operating system to avoid detection using subversion or evasion * Can load before the operating system loads, acting as a virtualization layer * Acts as a form of malware and can exist in firmware and as loadable library modules
Rootkits
83
a type of malicious software that is deliberately installed, generally by an authorized user. * is a piece of code that sits dormant for a period of time until some event invokes its malicious payload. * _ are difficult to detect. * They demonstrate the need for a separation of duties and a periodic review of all programs and services that are running on a system. * They reinforce need for active backups.
Logic Bombs
84
is software that “spies” on users, recording and reporting on their activities. * Typically installed without user knowledge, spyware can do a wide range of activities. * It can record keystrokes (commonly called keylogging) when the user logs into specific web sites. * It can monitor how a user uses a specific piece of software (monitor attempts to cheat at games).
Spyware
85
Software that is supported by advertising
Adware
86
- Adware comes in many different forms:
* Legitimate adware * Adware in the form of malware
87
The user is aware of the advertising and agrees to the arrangement in return for free use of the software.
* Legitimate adware
88
It is characterized by software that presents unwanted ads.
* Adware in the form of malware
89
* Hackers create armies of machines by installing malware agents on the machines, which then are called _.
zombies
89
One form of malware that is seemingly benign to a user is a botnet zombie.
Botnets
90
* These collections of machines are called _.
botnets
91
* These _ are used to conduct other attacks and to spread spam and other malware.
zombies machines
92
nothing more than methods used by software developers to ensure that they could gain access to an application even if something were to happen in the future to prevent normal access methods.
Backdoors and Trapdoors
93
used to refer to programs that attackers install after gaining unauthorized access to a system to ensure that they can continue to have unrestricted access to the system, even if their initial access method is discovered and blocked.
backdoor
94
is a form of malware that performs some action and extracts ransom from a user. -- most common form of _ is one that encrypts a key file or set of files, rendering a system unusable, or dataset unavailable.
Ransomware
95
Malware Defenses * Malware can be defended against in a couple of simple steps:
* Use an antivirus program * Keep your software up to date
96
are attacks against a system that can occur at the network level, at the operating system level, at the application level, or at the user level (social engineering).
Application-level attacks
96
take advantage of several facts associated with computer applications.
Application-level attacks
97
* Attacks on computer systems and networks can be grouped into two broad categories:
1. Attacks on specific software 2. Attacks on a specific protocol or service
98
Generally possible because of an oversight in the code (and possibly in the testing of that code) or because of a flaw, or bug, in the code
Attacks on specific software
99
Attempt to take advantage of a specific feature of the protocol or service or to use the protocol or service in a manner for which it was not intended
Attacks on a specific protocol or service
100
is an attack designed to prevent a system or service from functioning normally. ** Can exploit a known vulnerability in a specific application or operating system ** Can attack features (or weaknesses) in specific protocols or services ** Attempts to deny authorized users access either to specific information or to the computer system or network itself
Denial-of-Service Attack
101
A DoS attack employing multiple attacking systems
distributed denial-of-service (DDoS) attack.
102
In a specific DoS attack known as a _, the attacker sends a spoofed packet to the broadcast address for a network, which distributes the packet to all systems on that network.
Smurf attack
103
relies on lies and misrepresentation, which an attacker uses to trick an authorized user into providing information or access the attacker would not normally be entitled to.
Social Engineering
104
is when someone examines all the network traffic that passes their NIC, whether addressed for them or not.
Sniffing
105
is nothing more than making data look like it has come from a different source.
Spoofing
106
- generally occurs when attackers are able to place themselves in the middle of two other hosts that are communicating. * A common method: hijacking.
Man-in-the-Middle Attacks
107
used to refer to a more specific type of attack—one in which the encrypted traffic issue is addressed.
“man-in-the-middle attack”
108
not generally considered a social engineering issue, nor a security issue for that matter, spam can, however, be a security concern. -- bulk unsolicited e-mail.
Spam
109
- is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users. * GOAL: is to obtain from the user information
Phishing
110
consists of misdirecting users to fake web sites that have been made to look official.
Pharming