CS Security Quiz 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/40

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 9:58 PM on 5/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

41 Terms

1
New cards

Why are SMS and Email insecure

it is unencrypted so there is no confidentiality, integrity, or authentication

2
New cards

Why are wireless networks less secure

signals travel through the air so anyone in range can eavesdrop, spoof, or jam

3
New cards

Why are mobile devices tricky

they have many interfaces so a larger attack surface with wifi, bluetooth, gps, apps, usb ports

4
New cards

Threat types

app based, physical threats, location tracking

5
New cards

App based threat

malware apps, ransomware, spy apps through camera/mic recording

6
New cards

Physical threats

stolen phone, SIM swapping, malicious USB charging

7
New cards

Location tracking threat

apps that track where you are constantly

8
New cards

Protections for mobile devices

lock the phone, update software, download only official apps, avoid public wifi, turn off unused features, backup data, don’t jail break

9
New cards

Why is email inherently insecure

sender can be faked (spoofed), no built in authentication, no guaranteed encryption

10
New cards

Main email threats

spam, phishing, spear fishing, business email compromise, social engineering

11
New cards

4 factors of authentication

what you know, what you have, what you are, where you are

12
New cards

Password formula

P = number of characters possible to the power of the length

13
New cards

Password risks

reuse, data breaches, social engineering, key loggers

14
New cards

Salt in hashing

adds randomness to a password before hashing

15
New cards

Internet is ___ secure by default

not

16
New cards

Packet sniffing

network cards can read all traffic in promiscuous mode

17
New cards

Four layer internet model

application, transport, internet, link

18
New cards

Application

HTTP, DNS, FTP

19
New cards

Transport

TCP (reliability)

20
New cards

Internet

IP addresses (routing)

21
New cards

Link

physical network

22
New cards

IP is

where

23
New cards

Port is

which service on that device

24
New cards

IP address

unique identifier for a device, IPv4 and IPv6

25
New cards

Ports

identify a service on a computer

26
New cards

Open ports

service is running and not blocked which means its an attack surface

27
New cards

DNS

domain name system that converts a website to an IP address

28
New cards

DNS vulnerability

can be attacked by spoofing or redirecting users

29
New cards

SYN Flooding

attacker sends many fake SYNs and server allocates resources and never finishes the connection so the server crashes

30
New cards

Smurf attack

attacker spoofs victim’s IP and sends a ping to broadcast so every device replies to the victim

31
New cards

Firewalls

separates internal network from the internet to allow or block packets based on IP, port, and protocol

32
New cards

Cookies

stored in browser and sent by the server, used for authentication, personalization, and tracking

33
New cards

Web attacks

XXS, XSRF, SQL injection

34
New cards

XXS

cross-site scripting where attacker injects code into a website and runs in the victim’s browser

35
New cards

XSRF

CSRF tricks your browser into sending requests while you’re logged in

36
New cards

SQL injection

attack sends input that becomes database code

37
New cards

TSL handshake

client and server agree on encryption verifying identity with a certificate and create a shared secret key provides CIA

38
New cards

TCP

reliable, ordered delivery, and retransmits lost packets

39
New cards

HTTPS guarantees

data is encrypted, not modified, and server is authentic

40
New cards

Certificates

prove identity of a website issued by a certificate authority and prevents man in the middle attacks

41
New cards

Wifi security

WEP is weak and anyone in range can intercept through rogue access points while WPA2 and 3 are strong