Practice 1 Copy Flashcards
The class A private IP address range contains the addresses from
10.0.0.0 to 10.255.255.255.255
The class B private IP address range contains the addresses from
172.16.0.0 to 172.31.255.255
The class C private IP address range contains the addresses from
192.168.0.0 to 192.168.255.255
The APIPA/link-local autoconfiguration range is from
169.254.0.0 to 169.254.255.255
Any workstation running unauthorized software that directs the device to participate in a DDoS attack as part of a larger botnet
Zombie
A ________ is a network of computers that have been compromised by a Trojan, rootkit, or worm malware
Botnet
What is an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim
Phishing
Which attacks focus on a targeted set of people, not just an indiscriminate large group of random people
Spear Phishing
An email-based or web-based form of phishing that targets senior executives or wealthy individuals
Whaling
_______ is a social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services
Vishing
Which rule states that an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site
3-2-1 backup
Which backup rotation scheme is widely used to combine full and incremental backups to reduce backup time and enhance storage security
Grandfather-father-son
A scripting language based on Microsoft’s Visual Basic programming language
VBScript
A general-purpose programming language that can develop many different kinds of applications
Python
Python scripts are saved using the_______ extension
.py
A _______ file is used for a shell script and its first line always begins with #!/bin/bash that designates the interpreter
.sh
A ________ is a file that contains a list of commands to be read and executed by the shell in Linux and macOS
Shell Script
A scripting language that is designed to create interactive web-based content and web apps
Javascript
JavaScript is stored in a _____ file
.js
What stores a single character, such as J, D, or Z
Character
What stores a group of characters, such as Hello, PYTHON, or JasonDion?
String
What stores a value of TRUE (1) or FALSE (0)?
Boolean
What stores a whole number, such as 21, 143, or 1024
Integer
The concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities
Least Privilege