CIS 1350C –Exam 1 Study Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/93

flashcard set

Earn XP

Description and Tags

Flashcards for CIS 1350C Exam 1 Study Guide

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

94 Terms

1
New cards

Domain Name Service (DNS)

component of the internet that translates human readable domain names into machine-readable IP addresses.

2
New cards

Phreaking

the manipulation of telephone systems to make free phone calls, often involving the fraudulent manipulation of telephone signaling.

3
New cards

Social Engineering

Manipulating people to gain access to systems or information.

4
New cards

Malware

(Malicious software) Any software designed to disrupt, damage, or gain access to computer systems and networks.

5
New cards

Logic Bomb

Malware that executes when certain conditions are met.

6
New cards

Sneaker

Someone hired to test the security of a system.

7
New cards

Authentication

Verifying the identity of a user, process, or device.

8
New cards

CIA Triangle

Confidentiality, Integrity, Availability

9
New cards

SANS Institute

Cybersecurity information, training, and research.

10
New cards

Denial of Service (DoS) Attack

A malicious attempt to disrupt the normal functioning of a computer, network, or service by overwhelming it with a flood of illegitimate requests.

11
New cards

Session Hijacking

Taking control of an existing session between a client and server.

12
New cards

White Hat, Black Hat, and Gray Hat Hackers

Ethical hackers, malicious hackers, and hackers who sometimes act ethically and sometimes not.

13
New cards

Cracker

Someone who exploits vulnerabilities in computer systems and networks to breach security measures.

14
New cards

Script Kiddy

An unskilled hacker who uses pre-made tools.

15
New cards

Penetration Tester

Someone hired to find vulnerabilities in systems.

16
New cards

Firewall

Network security device that monitors and controls network traffic based on predefined rules.

17
New cards

Proxy Server

A server that acts as an intermediary between a client and a server, protecting users privacy and computer systems from attack.

18
New cards

First Computer Incident-Response Team

CERT

19
New cards

F-secure

Information about security threats and solutions.

20
New cards

CIDR

(Classless Inter-Domain Routing) Method of IP address allocation and IP routing that allows more efficient use of IP addresses.

21
New cards

Host

Any device connected to a network.

22
New cards

Proxy Server

A server that acts as an intermediary between a client and a server.

23
New cards

IPv4 Address

Consists of 4 octets (32 bits total) divided into network and host portions.

24
New cards

IP Address starting with 194

Class C

25
New cards

IP Address starting with 191

Class B

26
New cards

MAC Address

Media Access Control Address; a unique hardware address for a network interface, used to identify devices on a network.

27
New cards

Protocols at the Physical Layer of the OSI Model

None

28
New cards

What do the first 3 Bytes of MAC Address represent?

Manufacturer ID (Organizationally Unique Identifier)

29
New cards

tracert Command

Used to trace the route packets take to a destination.

30
New cards

ipconfig Command

Displays network configuration information.

31
New cards

ping Command

Sends ICMP echo requests to test network connectivity.

32
New cards

URL

Uniform Resource Locator; a web address. Specifies the location of a resource on the internet and a mechanism for retrieving it.

33
New cards

Session Layer of the OSI Model

Establishes, maintains, synchronizes, and terminates sessions between applications.

34
New cards

What Layer does TCP Protocol Works At?

Transport Layer

35
New cards

Specification for Category 5 Cable

100MHz/100Mbps

36
New cards

Binary Equivalent of 240

11110000

37
New cards

Hub

(simplest connection device) A device that connects multiple network segments, forwarding data to all connected ports.

38
New cards

Switch

smart hub, sends packets only to intended host, is a 2 layer device.

39
New cards

Router

A device that forwards data packets between networks. More sophisticated, limits traffic to intended network. Is a 3 layer device.

40
New cards

Repeater

A device that amplifies a signal to extend the range of a network.

41
New cards

TCP/IP Protocol on Port 53 (UDP)

DNS (Domain Name System)

42
New cards

TCP/IP Protocol on Ports 20 and 21

FTP (File Transfer Protocol)

43
New cards

TCP/IP Protocol on Port 80

HTTP (Hypertext Transfer Protocol)

44
New cards

TCP/IP Protocol on Port 25

SMTP (Simple Mail Transfer Protocol)

45
New cards

Pump and Dump

An illegal scheme of boosting the price of a stock artificially through false and misleading statements.

46
New cards

Cookie

A small text file that websites store on a user's computer to remember preferences or track browsing activity.

47
New cards

Country with Strictest Cybercrime Laws

Romania

48
New cards

Firefox and Google Chrome

Web Browsers

49
New cards

First Party vs Third Party Cookies

First-party cookies are set by the website being visited; Third-party cookies are set by a different domain.

50
New cards

Identity Theft and Identity Fraud

Identity theft evolves stealing someone’s personal info., while fraud is the use of that info. to commit crimes.

51
New cards

Should you use your real name in a chat room?

No

52
New cards

Guidelines for online investing

Only invest with well known, reputable brokers. If it’s to good to be true, avoid it.

53
New cards

Guidelines for using online auction sites

Only use reputable auction sites. Read feedback. Use separate credit card.

54
New cards

Cyberstalking

Using electronic communication to harass or stalk someone.

55
New cards

Phishing

Form of identity theft that relies on individuals unwillingly volunteering personal details or info.

56
New cards

Shill Bidding

Placing bids on an item to artificially inflate its price.

57
New cards

Bid Shielding

Submitting very high bids to discourage others from bidding.

58
New cards

Bid Siphoning

Lure bidders away from legitimate auction sites by offering same item at lower price.

59
New cards

Guidelines for protecting against identity theft

Limit providing personal info., destroy documents that have personal info. on them, check credit frequently, check online driving records once per year.

60
New cards

Why should a cybercrime law be specific?

To ensure clarity and prevent misinterpretations.

61
New cards

Most common type of attacks on a system

Denial of Service attack, cyberattack where an attacker attempts to make a website or network inaccessible to legitimate users by overwhelming it with traffic

62
New cards

What is a firewall used for?

To protect a system or network from unauthorized access. Monitor/Control traffic.

63
New cards

Land Attack

(Simplest of all attacks) An attack where the source and destination IP addresses of a packet are the same, causing a system to crash.

64
New cards

Smurf Attack

A type of DoS attack that floods a network with ICMP echo requests using a spoofed source address.

65
New cards

Teardrop Attack

An IP fragmentation attack involving sending fragmented packets that, when reassembled, overflow a buffer.

66
New cards

Buffer Overflow Attack

Exploiting a vulnerability where a program writes data beyond the allocated buffer, potentially overwriting adjacent memory.

67
New cards

Ways to prevent or defend against denial-of-service attacks

Configure firewall to filter out ICMP packets, egress filter fo ICMP packets, disallow any incoming traffic. Use tools such as NetStat and other. Disable all IP broadcasts.

68
New cards

Defenses Against TCP SYN Flood Attacks

SYN cookies

69
New cards

What was myDoom?

Fastest spreading email worm in history.

70
New cards

What is Tribal Flood Network?

Set of computer programs designed to DDoS.

71
New cards

What is stack tweaking?

Method of Dos prevention, alters TCP stack.

72
New cards

What are SYN cookies?

Defense mechanism against SYN Flood Attacks.

73
New cards

What is ping of death?

DoS attack, sending a single large packet.

74
New cards

What command instructs the ping utility to send packets until explicitly told to stop?

-t

75
New cards

What is the group Anonymous?

Decentralized and international activist and hacktivist collective.

76
New cards

What does the ping -l option do?

Test network connectivity.

77
New cards

How are RST cookies used?

Protect servers from SYN flood attacks.

78
New cards

Virus

A self-replicating program that infects files and requires a host to spread.

79
New cards

Worm

A self-propagating program that can spread without human interaction.

80
New cards

Trojan Horse

Malware disguised as legitimate software.

81
New cards

Rootkit

Malware that hides its presence on a system and is designed to get unauthorized access to to a computer system.

82
New cards

Buffer Overflow Attack

Exploiting a vulnerability where a program writes data beyond the allocated buffer, potentially overwriting adjacent memory.

83
New cards

Logic Bomb

Malware that executes when certain conditions are met.

84
New cards

Web-Based Code

Malicious code embedded in websites.

85
New cards

McAfee and Norton

Antivirus software

86
New cards

What was the Bagle virus?

Botnet involved int proxy-to-relay email spam.

87
New cards

What was the I Love You virus?

Massive worm spread through email in 2000, stealing passwords.

88
New cards

Why is Microsoft Office a tempting target for viruses?

Because it is widely used and has known vulnerabilities.

89
New cards

Most common delivery method for spyware

Email or Drive by downloads.

90
New cards

Most common way for a virus to spread

Email attachments.

91
New cards

What was the Sobig virus?

Worm from 2000’s, caused $35 billion in damage.

92
New cards

What was the MacDefender virus?

Trojan horse from 2011, masquerading as antivirus program in attempt to get users to share their credit card info.

93
New cards

What was the Mimail virus?

family of mass-mailing computer worms that first emerged in August 2003.

94
New cards

What is the Nonvirus virus?

Applications that are not malicious by nature.