Fifth Class Test Review Flashcards

1
Q

_____ Allows a single hardware platform to provide resources for multiple servers

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a language or format that allows two computers to talk to each other

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What inspect detects and blocks traffic based on policies or parameters

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the command in Linux to see all files in a directory

A

LS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What device connect computers and devices

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is also know as a logical address

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three cyber security principals

A

CIA (Confidentiality Integrity Availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the least restricted account in Linux

A

Root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In windows what is the most restricted account

A

Guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the subnet mask for a class a network

A

255.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 5 layers of the defense in depth model

A
Physical
Network
Host
Application
Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of malware pretends to be a legitimate computer program

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A firewall is an example of what type of control

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What device connects networks

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name the tree virtual box networks mode

A

Internal
NAT
Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is also know as the brain of a computer

17
Q

What is the purpose of a server operating system

A

To deploy and manage services

18
Q

DNS sec is used to prevent what type of an attack

A

DNS poisoning

19
Q

What is a security flaw that can be exploited by an attacker

A

Vulnerability

20
Q

How are vulnerabilities represented in the NVD (National Vulnerability Database)

A

CVE (Common Vulnerabilities and Exposures)

21
Q

What is the numbering system used in the MAC address

A

Hexadecimal

22
Q

What type of addresses are used on a switch network

A

MAC (Media Access Control)

23
Q

What is responsible for translating an IP address to domains and vise versa

A

DNS (Domain Name System)

24
Q

What type of malware encrypts your files and demands a payment

A

Ransomware

25
What type of cyber-attack includes phishing
Social engineering
26
What type of control is your company's security awareness program.
Administrative
27
From smallest to largest what are the three classes of sub domain
Class C Class B Class A
28
What service allocates IP address information
DHCP (Dynamic Host Configuration Protocol)
29
What is the IP address for local host
127.0.0.1