Quiz 1 Flashcards

(60 cards)

1
Q

Who was the main figure at Bletchley park that lead the effort to crack the Enigma codes and created the Bombe?

A

Alan Turing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

He is considered one of the first hackers but was mostly a phreaker and adept in the art of social engineering

A

Kevin Mitnick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

She studied under Charles Babbage and is the first person known to conceive of a reprogrammable computing device

A

Ada Lovelace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

He is considered, by many, to be the creator of the internet because he lead the Advanced Research Project Agency that created ARPAnet, a precursor to the internet

A

Larry Roberts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

He was another pivotal figure at Bletchley Park and his contributions include traffic analysis, a precursor to what Facebook and Google to with metadata today.

A

Gordon Welchman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The electro-mechanical rotor cipher used to encrypt day-to-day messages to the German troops

A

Enigma Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The first fully functional electric computer developed at the University of Pennsylvania

A

ENIAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This was the first operating system developed with security in mind from the ground up

A

Multics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The two developments that shrunk computers and allowed for the decentralization of computing

A

Transistor and microprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This pre-computer device was developed by Charles Babbage to help compute Bernoulli Numbers

A

Differencing Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What medium were the German codes being broadcast over during WWII?

A

Analog Radio Waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The main storage medium used to transfer large amounts of data between facilities during the cold war era

A

Magnetic Tape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARPAnet was the first to implement these protocols that we still use for many internet communications today; handshakes included

A

TCP / IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Robert Metcalf developed these standards that allow machines to talk to each other over a LAN

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Many of the problems we see with internet security today, stem from the early use of these standards rather than adopting industry standards that had been well vetted

A

“De facto”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Tech Model Railroad club came up with this early “hacker dictionary” that is still in use today

A

The Jargon File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

These were the two decades in which the primary development of the internet took place

A

1970s and 1980s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

She is credited with finding the first computer “bug”

A

Grace Hopper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

She is credited with conceptualizing and creating the first interpreter to ease the burdens of programming

A

Grace Hopper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This was the first computer security paper that detailed the need for security measures beyond that of physically locking down access to the machines

A

The Rand Report R-609

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This term refers to an attacker gaining access to a target’s network

A

Infiltrate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This term refers to going through the garbage trying to find PII and/or confidential information

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This type of exploit is one for which there, currently, is no patch from the vendor

A

Zero day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Where were access numbers written for some of the first hackers to find and utilize?

A

Phone Booths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What network joined ARPAnet in 1986; the time when it was first referred to as "The Internet"
NSFNet
26
A substitution cipher is also somtimes referred to after this historical figure that achieved his encryption by shifting all letters 3 places to the right
Caesar
27
This general type of encryption uses the same key to encrypt and decrypt
Symmetric
28
This algorithm uses the binary representation of data
XOR
29
This cipher uses the numerical location of each letter within the alphabet
Vernam
30
This early encryption method was developed by the Spartans and involved wrapping a papyrus around a rod of a certain size
Scytale
31
What does the C of the CIA triangle of Information Security stand for?
Confidentiality
32
What do the I and A of the CIA triangle stand for?
Integrity and Availability
33
Something that has value to an individual and organization is known as this in technical terms
Asset
34
This specific person or entity that carries out an exploit is known as this
Threat Agent
35
What is the password software that we spoke of in class and can be utilized by an attacker to perpetrate pass the hash or ticket attacks?
Mimikatz
36
When speaking of encryption, this is the original [human readable] version of a message
Plaintext
37
When speaking of encryption, this is the encrypted version of a message; not human readable
Ciphertext or cryptogram
38
This term refers to the time it would take for cryptanalysis to successfully decrypt a message when the key is unknown
Work Factor
39
Asymmetric encryption is known as this type of encryption because two different keys are involved
Public Key
40
This type of cryptography involves hiding messages inside of something else, such as an image
Steganography
41
These people used non-standard hieroglyphs to create the first known form of encryption
Egyptians
42
This type of attack against a crypto system involves trying every possible combination for a given character set
Brute Force
43
During WWII, this group of Native Americans used their language in addition to new code words to create the only non-computer generated encryption to not be broken during either world war
Navajo Code Talkers
44
With private key encryption, when delivering the key, you want to deliver it by a different means from the ciphertext; also known as this...
Out of band
45
This term refers to the ability for PKI to enforce online transactions; the user can be held accountable with reasonable assurance that they carried out the transaction
Nonrepudiation
46
This command can be used to test network connectivity as well as tell if a system is active on the network
ICMP
47
This command shows you every hop a packet takes along its way to the destination
Traceroute
48
This command can be used to retrieve the MAC address of a client on the network; whether or not it is replying to PING requests
ARP
49
This command allows you to see all the ports actively connected or listening on the local machine
Netstat
50
We utilized this command to remotely scan another machine on the network and find information like open ports and potentially detect the OS
nmap / zenmap
51
This was the group we had to add our account to for it to become an administrator on the domain
Domain Admins
52
This is the name of Microsoft's server role that allows for establishing a domain
Active Directory
53
This is the commandline environment we have been running commands in
powershell
54
This is the term that is used to refer to a server that is part of a domain, but NOT a domain controller
Member Server
55
This is the built-in Windows virtualization platform we are utilizing in class
Hyper-V
56
When setting what all will be entailed in the assessment, you are setting this
Scope
57
This should be the final step in your risk assessment
Documentation
58
This should be the 2nd step of a risk assessment
Identify Risks
59
You should consider these individuals in most risk assessments as they are often the biggest threat
Insiders / your own employees
60
If you have to follow rules set by a governing body because of the type of data you process, then it is said you must be in this...
Compliance