Test 2 Smaller Flashcards
(47 cards)
What are the five basic steps in a vulnerability assessment?
Asset Identification, Threat Identification, Vulnerability Appraisal, Risk Assessment, Risk Mitigation
What is the purpose of an attack tree in threat modeling?
Visually displays possible attacks, their goals, and the techniques used, structured as an inverted tree.
What are the three possible states of a network port?
Open, Closed, Blocked.
Name three tools used in protocol analysis.
Wireshark, Microsoft Message Analyzer, tcpdump.
What is a honeypot?
A decoy system used to lure attackers and study their methods.
What does the ping command do in network security?
Tests the reachability of a device by sending ICMP packets and measuring response time.
What is tracert used for?
Displays the path packets take to a destination, identifying each router along the route.
How does a port scanner help assess network security?
Identifies which ports are open, closed, or blocked to determine service vulnerabilities.
What is the function of a vulnerability scanner?
Checks for known vulnerabilities in systems like unpatched software or open ports.
What does a protocol analyzer like Wireshark do?
Captures and analyzes network traffic for performance or security issues.
What’s the difference between a honeypot and a real server?
A honeypot is fake and lures attackers, while a real server hosts production services.
What is banner grabbing?
Collecting information from services like version and type, often via connection banners.
Name 3 password cracking tools.
John the Ripper, Cain and Abel, THC Hydra.
What’s the key difference in schema between SQL and NoSQL?
SQL requires a predefined schema; NoSQL is schema-less and flexible.
What are typical use cases for NoSQL?
Social apps, ads, BI, massive user growth, horizontally scaled systems.
Explain vertical vs horizontal scaling.
Vertical: upgrade single machine; Horizontal: add more machines.
Why is denormalization used in NoSQL?
Improves read speed by duplicating data.
Can NoSQL support transactions?
Only within a single document.
What is vertical scaling in SQL databases?
Improving performance by upgrading the CPU/RAM of a single server.
Why is horizontal scaling important in NoSQL?
Allows growth by adding more servers, essential for high-traffic apps.
What does it mean that SQL is ‘schema-first’?
Requires table structures and types to be defined before use.
How does NoSQL handle data integrity compared to SQL?
It lacks constraints, so integrity checks must be handled by the app.
What is a JOIN in SQL and why is it useful?
Combines rows from different tables using a related column.
What are the 4 main components of Hadoop?
Hadoop Common, HDFS, MapReduce, YARN.