Practice 1 Copy Flashcards

1
Q

The class A private IP address range contains the addresses from

A

10.0.0.0 to 10.255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The class B private IP address range contains the addresses from

A

172.16.0.0 to 172.31.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The class C private IP address range contains the addresses from

A

192.168.0.0 to 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The APIPA/link-local autoconfiguration range is from

A

169.254.0.0 to 169.254.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Any workstation running unauthorized software that directs the device to participate in a DDoS attack as part of a larger botnet

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ________ is a network of computers that have been compromised by a Trojan, rootkit, or worm malware

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an email-based social engineering attack in which the attacker sends an email from a supposedly reputable source, such as a bank, to try to elicit private information from the victim

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which attacks focus on a targeted set of people, not just an indiscriminate large group of random people

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An email-based or web-based form of phishing that targets senior executives or wealthy individuals

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______ is a social-engineering attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which rule states that an organization should create (3) one primary backup and two copies of the data, (2) save the backups to two different types of media, and (1) keep at least one backup copy off-site

A

3-2-1 backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which backup rotation scheme is widely used to combine full and incremental backups to reduce backup time and enhance storage security

A

Grandfather-father-son

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A scripting language based on Microsoft’s Visual Basic programming language

A

VBScript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A general-purpose programming language that can develop many different kinds of applications

A

Python

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Python scripts are saved using the_______ extension

A

.py

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _______ file is used for a shell script and its first line always begins with #!/bin/bash that designates the interpreter

A

.sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ________ is a file that contains a list of commands to be read and executed by the shell in Linux and macOS

A

Shell Script

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A scripting language that is designed to create interactive web-based content and web apps

A

Javascript

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

JavaScript is stored in a _____ file

A

.js

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What stores a single character, such as J, D, or Z

21
Q

What stores a group of characters, such as Hello, PYTHON, or JasonDion?

22
Q

What stores a value of TRUE (1) or FALSE (0)?

23
Q

What stores a whole number, such as 21, 143, or 1024

24
Q

The concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities

A

Least Privilege

25
A security framework that requires all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data
Zero-Trust
26
An approach to cybersecurity in which a series of defensive mechanisms are layered to protect valuable data and information
Defense in Depth
27
A set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict how the network, website, or system may be used and sets guidelines as to how it should be used
acceptable use policy (AUP)
28
(AUP)
acceptable use policy
29
A specific identifier that contains a value that cannot be changed within the program
Constant
30
When a computer repeats the task until a condition is met
Loop
31
What is used to control the flow within a computer program or script, usually based on some logic condition
A Branch
32
A placeholder in a script containing a number, character, or string of characters
Variables
33
A standalone malware computer program that replicates itself to spread to other computers
Worm
34
Malicious software designed to infect computer files or disks when it is activated. May be programmed to carry out other malicious actions, such as deleting files or changing system settings
Virus
35
A type of malware that looks legitimate but can take control of your computer. Designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network
Trojan
36
The most common form of a trojan is
Remote Access Trojan (RAT)
37
RAT
Remote Access Trojan
38
Allows an attacker to control a workstation or steal information remotely
Remote Access Trojan (RAT)
39
A type of malware designed to deny access to a computer system or data until a ransom is paid
Ransomware
40
Often used to inject the attacker into the conversation path between the two parties. The act of disguising a communication from an unknown source as being from a known, trusted source
Spoofing
41
A social engineering technique to gain access to a building by following someone unaware of their presence
Tailgating
42
Consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly
Brute-Force
43
WPA
Wi-Fi Protected Access
44
Usually uses to install an image on the computer over the network. Allows a workstation to boot from a server on a network before booting the local hard drive's operating system
Preboot eXecution Environment (PXE)
45
The primary administrative tool for defining and controlling how programs, network resources, and the operating system operate for users and computers in an organization
Group Policy Editor (gpedit.msc)
46
PXE
Preboot eXecution Environment
47
CHAP
Challenge-Handshake Authentication Protocol
48
A protocol that is used to authenticate a user or network host to an authenticating entity
Kerberos