1/100
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
What are the three parts of the CIA Triad? What does each one protect?
Confidentiality (protects data from unauthorized access), Integrity (protects data from unauthorized changes), Availability (ensures data is accessible when needed)
What are the three parts of AAA? How do they work together in system security?
Authentication (verifying identity), Authorization (granting permissions), Accounting (tracking actions); they work together to control access and monitor usage
Why is it important to balance confidentiality, integrity, and availability?
Overemphasizing one may compromise the others and harm overall system security
What techniques do attackers use to manipulate human behavior?
Authority, urgency, familiarity, intimidation, and other psychological tricks
How do attackers trick users into giving up information without realizing it?
By exploiting human trust, fear, or curiosity through deception and manipulation
What are common social engineering scenarios?
Tailgating (following someone into a secure area), dumpster diving (searching trash for sensitive info), baiting (offering something enticing), shoulder surfing (observing input)
What makes phishing different from spam?
Phishing attempts to trick users into giving sensitive information, while spam is unsolicited messages that are not always malicious
What are the different types of phishing?
Spear phishing (targeted), whaling (targeting executives), vishing (voice phishing), smishing (SMS phishing)
Why are executives often targeted in phishing?
They have access to sensitive data and can authorize high-value transactions
What are the main types of malware?
Viruses, worms, trojans, rootkits, logic bombs, ransomware, keyloggers
How does each type of malware spread, hide, or cause damage?
Viruses attach to files, worms self-replicate, trojans disguise as useful software, rootkits hide in system, logic bombs trigger on conditions, ransomware locks files, keyloggers record keystrokes
What does a zero-day attack mean?
An attack exploiting a vulnerability that is unknown to the vendor and has no patch yet
What makes a strong password?
Long, complex, including letters, numbers, and symbols; not easily guessable
Why should passwords be updated regularly?
To reduce the risk if a password is compromised
What are the three MFA categories?
1) Something you know (password), 2) Something you have (security token), 3) Something you are (biometrics)
Why is MFA more secure than a password alone?
It requires multiple forms of authentication, making it harder for attackers to gain access
What are the main purposes of Task Manager?
Processes (view running apps), Performance (monitor CPU/RAM), Startup (manage startup apps), Users (see logged-in users)
What does System Information show?
Detailed hardware and software configuration of the system
What is Event Viewer used for?
Viewing system logs to diagnose errors and track events
Which command reveals your IP address?
ipconfig
What are the three types of access controls?
Physical (locks, badges), Logical (passwords, permissions), Administrative (policies, procedures)
Give examples of each type of access control.
Physical: door lock, badge; Logical: login/password, file permissions; Administrative: company security policies, user training
How do access controls work together to secure systems?
They provide multiple layers of protection: physical, digital, and policy enforcement
What do the symbols /, ~, $, and # represent in Linux?
/: root directory, ~: home directory, $: regular user prompt, #: root user prompt
What’s the difference between absolute and relative paths?
Absolute path specifies full location from root; relative path specifies location from current directory
What are the purposes of common Linux commands?
pwd: print working directory, cd: change directory, ls: list files, mkdir: create folder, cp: copy file, mv: move/rename file, rm: remove file
What are the types of Windows updates?
Quality (bug fixes), Feature (new features), Driver, Optional, Firmware
Why are updates critical for system stability and security?
They fix bugs, patch security vulnerabilities, and improve performance
What is the primary role of the CPU?
Process instructions and execute programs
What is the role of the motherboard?
Holds CPU, RAM, and other components; allows communication between them
What is the role of RAM?
Volatile memory used for temporary data storage and quick access
What is the role of the GPU?
Process graphics and rendering tasks
What is the role of the chipset?
Manages data flow between CPU, memory, and peripherals
What is the difference between volatile and non-volatile memory?
Volatile memory loses data when powered off (RAM); non-volatile memory retains data (HDD, SSD)
What is the purpose of firmware?
Low-level software stored on hardware to initialize and control devices during boot
What are the differences between HDDs and SSDs?
HDD: mechanical, slower, more storage; SSD: no moving parts, faster, more reliable
What are cooling methods for PCs?
Active (fans, liquid cooling), Passive (heat sinks)
What are the purposes of an operating system?
Manage hardware, files, memory, processes, and user access
Compare GUI vs CLI operating systems.
GUI: user-friendly visual interface; CLI: command-line interface, faster for advanced tasks
What are drivers and why are they important?
Software that allows OS to communicate with hardware devices
What is an application?
Software that performs specific tasks for the user, unlike the OS which manages system resources
What is Device Manager used for?
Manage hardware, install drivers, and troubleshoot devices
What is a browser cache and why can it cause problems?
Temporary storage of web data; can cause display or loading issues if outdated
What is an HCL and why does it matter?
Hardware Compatibility List; ensures hardware works with software or OS
What is a QVL and why does it matter?
Qualified Vendor List; ensures approved hardware meets compatibility requirements
What are the benefits of virtualization?
Cost savings, disaster recovery, efficiency, easier management
What does a hypervisor do?
Allows multiple virtual machines to run on a single physical host
Which file systems are used by Windows, macOS, and Linux?
Windows: NTFS/FAT32, macOS: APFS/HFS+, Linux: ext4, ext3, etc.
Why is a file system important?
Organizes data for storage and retrieval
Give examples of common file extensions.
.docx: Word document, .jpg: image, .mp3: audio
Explain star, mesh, bus, and hybrid topologies.
Star: central device; risk of central failure. Mesh: devices interconnected; high redundancy. Bus: single backbone; easy but limited. Hybrid: combination of topologies.
When would a business choose a mesh network instead of star?
For smaller networks requiring high redundancy and speed
How do physical and logical topologies differ?
Physical: how devices are physically connected; Logical: how data flows across the network
Describe encapsulation and decapsulation.
Encapsulation: adding headers/trailers at each OSI layer; Decapsulation: removing them to extract data
Why is encapsulation important?
It ensures data is properly packaged and delivered to the correct destination
What happens when a user enters a website address?
DNS resolves domain to IP, TCP handshake establishes connection, HTTP request retrieves website data
Match OSI layers with examples.
Application: Browser; Presentation: Encryption; Session: session management; Transport: TCP/UDP; Network: Router; Data Link: Switch; Physical: cables
Which OSI layer ensures reliable delivery with acknowledgments?
Transport layer; it handles acknowledgments and retransmissions
How does the Data Link layer ensure data reaches the correct device?
Uses MAC addresses, frames, error checking, and retransmission if needed
Convert decimal to binary.
Show division by 2 and remainders, then reverse remainders for binary result
Convert binary to decimal.
Multiply each bit by its positional value and sum the results
Why do computers rely on binary numbers?
Easier for electronic circuits to store and transmit as on/off signals
Define latency, reliability, and scalability.
Latency: time data travels; Reliability: consistent delivery; Scalability: ability to grow network capacity
Why is scalability important for LANs?
Allows the network to accommodate more users/devices as the company grows
How does redundancy improve reliability?
Provides backup paths and prevents single points of failure
Compare MAC addresses vs IP addresses.
MAC: hardware identifier, unique, stays with device; IP: logical identifier, can change, used for network routing
Why does a LAN need both physical and logical addressing?
MAC identifies local device; IP identifies device on wider network
How does a switch use MAC address table?
Records which MAC is on which port to forward frames efficiently
Which device operates at Layer 2 of OSI?
Switch; connects devices in LAN and forwards frames using MAC addresses
What Windows command shows your MAC address?
ipconfig /all
Give an example of an Application layer protocol.
HTTP; used to request and transfer web content
What is the wiring order for T-568A and T-568B?
T-568A: White/Green, Green, White/Orange, Blue, White/Blue, Orange, White/Brown, Brown; T-568B: White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown
How does a switch learn which devices are connected to its ports?
Records MAC addresses during communication with devices
What happens when a switch receives a frame for an unknown MAC?
Floods frame to all ports except source; updates table when device responds
Why do switches age out MAC addresses?
Addresses may change; aging prevents outdated entries
Why is flooding inefficient?
Sends data to all devices unnecessarily, wasting bandwidth
How does a MAC table improve switch efficiency?
Only forwards frames to correct port, reducing unnecessary traffic
What is the purpose of a default gateway?
Sends traffic to devices outside the local network; misconfiguration prevents external communication
What is the purpose of the loopback address?
Used for testing network interface; example: 127.0.0.1
What is the APIPA range and why can't it reach the internet?
169.254.x.x; assigned automatically when DHCP fails; no default gateway, so no internet access
Convert binary IPv4 to dotted decimal.
Example: 11000000.10101000.00000001.00001010 = 192.168.1.10
What does a subnet mask do?
Defines which portion of IP is network and which is host
With subnet mask 255.255.255.0, how many host bits? How many usable addresses?
8 host bits; 256 addresses; 254 usable (excluding network/broadcast)
What problem does ARP solve?
Maps IP addresses to MAC addresses for local delivery
How does a device use ARP?
Sends broadcast requesting MAC for an IP; device responds; stored in ARP cache
Which command shows ARP cache in Windows?
arp -a
What is IPv6 equivalent of ARP? NDP (Neighbor Discovery Protocol); sends solicitation and advertisement messages to map IP to MAC
What is the main purpose of DHCP?
Automatically assigns IP addresses and configuration to devices
What is a DHCP scope?
Defines range of IP addresses and settings DHCP can assign
What is a DHCP lease and what happens when it expires?
Temporary IP assignment; client requests renewal or receives new IP when expired
Difference between DHCP reservation and exclusion?
Reservation: always assigned to same device; Exclusion: IP cannot be assigned
Which devices are good candidates for DHCP reservations?
Printers, servers; need consistent IP for accessibility
List four steps in DHCP process (DORA).
Discover, Offer, Request, Acknowledge
How do routers separate broadcast domains?
They forward traffic between subnets, reducing congestion and improving security
Why do routers only need to know networks, not individual hosts?
Send traffic to correct network; devices/switches handle host delivery
How does a host determine if destination is local or remote?
Compare destination IP with own network/subnet
How does a router use the default gateway?
Sends outbound traffic to external networks through gateway
Define unicast, broadcast, multicast with examples.
Unicast: one-to-one (email); Broadcast: one-to-all (alerts); Multicast: one-to-group (video call)
What MAC address is used in Ethernet broadcast?
FF:FF:FF:FF:FF:FF
Why can too many devices in one broadcast domain cause problems?
Increases traffic, potential network slowdowns