1/43
A set of flashcards covering the TCP/IP model layers, key protocols, and fundamental concepts and threats in cyber security.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
What are the four layers of the TCP/IP model?
Application layer, Transport layer, Internet layer, Link layer.
What protocols operate at the application layer of the TCP/IP model?
HTTP, HTTPS, SMTP, IMAP, and FTP.
Which protocols operate at the transport layer?
TCP and UDP.
What is the main function of the Internet layer?
Addresses and packages data for transmission, and routes packets across the network.
What hardware is associated with the link layer?
Network interface card (NIC) and OS device drivers.
What is cyber security?
processes & technologies designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access.
What are common types of cyber security threats?
malicious code (malware),
pharming
weak and default passwords
misconfigured access rights
removable media
outdated software.
What is pharming?
A cyber attack intended to redirect a website's traffic to a fake website.
What is penetration testing?
The process of attempting to gain access to resources without knowledge of usernames, passwords, and other normal means of access.
What are the two types of penetration testing?
Define social engineering.
The art of manipulating people to give up confidential information.
What is blagging?
Creating and using an invented scenario for a targeted victim to give up sensitive information.
What is phishing?
Fraudulently obtaining private information, often through email or messages.
What is shoulder surfing?
Observing a person's private information over their shoulder, e.g. watching someone enter their PIN.
What does the application layer do?
It is where network applications, such as web browsers or email programs, operate.
What is the primary role of the transport layer?
Sets up communication between two hosts and agrees on settings like packet size.
How are packets managed in the Internet layer?
Packets are addressed and packaged for transmission and routed across the network.
What alternative names might the link layer be known by?
Network access layer or network interface layer.
Why is it important to protect against social engineering?
To prevent unauthorized access to confidential information by manipulating individuals.
What type of malware is designed to damage or disrupt a network?
Malicious code (malware).
How can weak passwords pose a cybersecurity threat?
They are easier for attackers to guess or brute-force, leading to unauthorized access.
Why might removable media be a cybersecurity risk?
They can transport malware or allow unauthorized access to sensitive data.
What does unpatched software do to a network?
It can leave vulnerabilities that attackers can exploit.
What type of attack simulates a malicious insider?
Penetration testing with knowledge of the target system.
What attack simulates an external threat?
Penetration testing without knowledge of the target system.
What is a common defense against phishing?
Being cautious of unsolicited emails asking for personal information.
What technological measures can be used for cyber security?
Firewalls, intrusion detection systems, and encryption.
How does shoulder surfing relate to social engineering?
It is a method of obtaining sensitive information through observation.
What is the key purpose of cyber security?
To protect assets from unauthorized access and damage.
What role does a network interface card (NIC) play?
It connects a computer to a network.
What kind of damage can malware cause?
It can corrupt, steal, or delete data, disrupt operations and install other malicious software.
What does HTTP stand for?
HyperText Transfer Protocol.
What is the secure version of the HTTP protocol?
HTTPS (HyperText Transfer Protocol Secure).
What can phishing emails often look like?
They may appear to be from legitimate companies or users.
What should be done with default passwords?
They should be changed to strong, unique passwords immediately.
What is a common protection measure against social engineering attacks?
Training employees to recognize and respond to manipulation tactics.
What does the transport layer ensure about data packets?
It ensures they are delivered correctly and in the right order.
Which protocol is mainly responsible for data routing?
The IP (Internet Protocol).
What is a common characteristic of social engineering attacks?
They often exploit human psychology rather than technical vulnerabilities.
What is the significance of having updated software?
It helps mitigate security risks by fixing vulnerabilities.
How does penetration testing improve security?
By identifying and addressing vulnerabilities before they can be exploited.
What is the main mode of protection against malware?
Antivirus software and regular system updates.
What does a firewall do?
It monitors and controls incoming and outgoing network traffic based on security rules.
Can cyber security threats evolve?
Yes, cyber threats continuously evolve, requiring constant vigilance.