Cybersecurity Key Concepts: PKI, Encryption, OSI Layers, and Network Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/36

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:33 PM on 2/16/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

37 Terms

1
New cards

Public Key Infrastructure (PKI) relies on what two things for secure communications?

Secrecy of private keys and trust in Certification Authorities (CAs)

2
New cards

ASCII representation of lowercase "a" (hex, decimal, binary)

61h, 97d, 01100001b

3
New cards

What is the purpose of a DMZ?

To segment public-facing servers from the internal network for security

4
New cards

Asymmetric encryption provides what security property?

Non-repudiation

5
New cards

Wireshark display filter for traffic to or from IP 192.168.1.1

ip.addr == 192.168.1.1

6
New cards

What is a collision attack?

When two different inputs produce the same hash value

7
New cards

Can a collision attack reveal the original plaintext?

No

8
New cards

Which OSI layer handles encryption?

Presentation Layer (Layer 6)

9
New cards

Why is Asset Management important in cybersecurity?

You cannot protect what you do not know you possess

10
New cards

What is defense-in-depth?

A layered security approach using multiple security controls

11
New cards

Example of layered defense

Adding IDS and employee security training along with firewall and antivirus

12
New cards

Risk of unauthorized personal devices on corporate network Creates:

a backdoor into the network

13
New cards

Linux command to view active network connections:

netstat

14
New cards

Command to run commands with administrative privileges:

sudo

15
New cards

What is encryption?

Converting plaintext into unreadable ciphertext using a key

16
New cards

Which OSI layer routes packets between networks?

Network Layer (Layer 3)

17
New cards

Purpose of the NIST Cybersecurity Framework (CSF)

To provide guidelines for managing cybersecurity risks

18
New cards

What should you do with suspicious email attachments?

Report to IT/security without opening

19
New cards

Principle of Least Privilege definition

Users get only the minimum access needed for their role

20
New cards

Does UDP guarantee reliable delivery?

No

21
New cards

Protocol that resolves IP addresses to MAC addresses

ARP (Address Resolution Protocol)

22
New cards

Protocol that dynamically assigns IP addresses

DHCP (Dynamic Host Configuration Protocol)

23
New cards

Primary use of Kali Linux

Penetration testing and security auditing

24
New cards

Security principle that limits access to necessary permissions

Principle of Least Privilege (PoLP)

25
New cards

Which CIA triad principle prevents unauthorized access?

Confidentiality

26
New cards

Example of confidentiality violation

Unauthorized access to payroll data

27
New cards

What does PR.AA in NIST CSF Protect function include?

Identity management, authentication, and access control

28
New cards

Example of PR.AA implementation

Multi-Factor Authentication (MFA)

29
New cards

What is reasonable assurance in cybersecurity?

Adequate security proportional to risk and cost

30
New cards

Best choice under reasonable assurance principle

Cost-effective protection against most likely threats

31
New cards

Smart speaker security best practice during sensitive conversations

Mute microphone or unplug device

32
New cards

What does IDS do?

Monitors network traffic for suspicious activity

33
New cards

Difference between TCP and UDP TCP is reliable;

UDP is not reliable

34
New cards

What does ASCII represent?

Characters as numeric codes computers can understand

35
New cards

What is non-repudiation?

Prevents sender from denying sending a message

36
New cards

What is a private key used for?

Decryption and digital signatures

37
New cards

What is a public key used for?

Encryption and signature verification