General Cyber Flashcards

1
Q

What is a SCADA network?

A

SCADA systems are used to monitor and control a plant or equipment in industries such as telecommunications, water and waste control, energy, oil and gas refining and transportation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is TACACS+ used for?

A

TACACS+ is used on AAA servers. authentication, authorization, and accounting services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is tarpitting?

A

A tarpit is a service on a computer system that purposely delays incoming connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is PFS?

A

PFS (Perfect Forward Secrecy) is an additional security layer for your VPN connection. The primary purpose of using PFS is to ensure the security and confidentiality of all past and future communication and traffic even though the current key is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is 3DES Symmetric or Asymmetric encryption?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is AES Symmetric or Asymmetric encryption?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AES, Blowfish, DES, Triple DES, Serpent, and Twofish are what kind of encryption?

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RSA , DIFFLE, ELLIPTICAL KEY are what kind of encryption?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Diffie–Helman?

A

Diffie–Hellman key exchange is a method of securely exchanging cryptographic keys over a public(insecure) channel and was one of the first public-key protocols.
Combining Bobs Private Key and Alices Public Key yields the same key as Alices Private Key and Bobs Public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is IVR?

A

Interactive voice response is a technology that allows a computer to interact with humans through the use of voice and DTMF (Dial Tone Multi Frequency) tones input via a keypad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these would be the most useful attack to gain access to a WPA2-PSK network?

A

Dictionary Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which encryption uses large prime numbers to encrypt public keys?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a buffer overflow?

A

A buffer overflow is when user input overflows the size of the accepting buffer and is written into memory. Attackers use buffer overflows to insert malicious code into a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to prevent a buffer overflow?

A

Write the application to make sure the application doesn’t allow anything to write into memory where it isn’t expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a good way to prevent an Evil Twin?

A

Don’ broadcast the SSID of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a rouge access point?

A

an access point that can be plugged into your network that allows unauthorized access.

17
Q

how to prevent rouge access point?

A

802.1x requires authentication for resources on network. uses NAC (network access control)

18
Q

What is 802.1x

A

standard for NAC (Network Access Control)

19
Q

What is EAP?

A

The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands on authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the Internet.

20
Q

________ involves altering the operating system to install applications from an unofficial source.

A

sideloading

21
Q

What technique does a hacker use to identify the type of operating system or application running on a target system?

A

Banner grabbing

22
Q

________ are used to crack WPA/WPA2 passwords by making educated guesses using a pre-defined list of possible passwords.

A

Dictionary attacks

23
Q

_________ was intended to be an open source encryption protocol from its inception. The patents expired on other listed protocols, or they were initially classified and not available to the public.

A

Blowfish

24
Q

___________ attack involves sending fragmented TCP/IP packets to a target. The victim is unable to properly reconstruct the order of the packets, but the overlap of the fragments causes this to fail, resulting in a DoS for the victim.

A

Teardrop

25
Q

___________ gateway is a type of firewall that operates at the session layers of the OSI model. They can also operate as a ‘shim-layer’ between the transport and application layers of the TCP/IP stack. Their function is to monitor the TCP handshaking between packets, determining whether a requested session is legitimate.

A

Circuit-level

26
Q

_______ systems are found in numerous household applicances (washing machine), and can be used in both smaller portable devices (digital watch) and large static installations (traffic light).

A

Embedded

27
Q

How can sniffers be mitigated and broadcast traffic be decreased?

A

VLAN

28
Q

IEEE 802.1q defines what?

A

Ethernet Frame VLAN Tagging

29
Q

What port does the basic TACACS+ protocol use?

A

TCP 49

30
Q

How does EAP-FAST provide authentication?

A

Protected Access Credentials (PAC)

31
Q

What is WPS and what does it do?

A

WPS stands for Wi-Fi Protected Setup. it was originally called Wi-Fi Simple Config. 7 That’s because we wanted to find a way to get people to connect to a wireless network securely, but do it in a way that would not require inputting any complicated passphrases.
There’s a lot of different ways to connect to a WPS enabled network. One might be to use a PIN that’s connected on an access point. One might be that you push a button on the front of the access point.

32
Q

primary differences between an incremental and differential backup

A

B. Incremental backups take less time to complete

C. Differential backups only back up files since the last full backup

33
Q

What is the difference between an isolated/segmented VLAN and an air gap?

A

An isolated VLAN does not allow network access. An air gap, unless completely isolated does.