Year 10 Digi Tech - Test 2 Revision

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/77

flashcard set

Earn XP

Description and Tags

These flashcards were created by my friend Andrew, and cover all three modules featured in the upcoming test.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

78 Terms

1
New cards

Computer Network

Interconnected devices exchanging data using protocols.

2
New cards

Network Protocols

Rules governing data transmission between devices.

3
New cards

Physical Connection

Cables or wireless links between devices.

4
New cards

Router

Device directing data between different networks.

5
New cards

Switch

Device connecting multiple devices within a network.

6
New cards

Firewall

Security device protecting networks from threats.

7
New cards

Source Encoding

Converting user information to binary data.

8
New cards

Data Transfer

Moving binary data from application to communication system.

9
New cards

Transmission

Sending data as signals over a medium.

10
New cards

Local Area Network (LAN)

Network covering a small geographic area.

11
New cards

Wide Area Network (WAN)

Network covering a large geographic area.

12
New cards

Wireless Networks

Networks using wireless connections for communication.

13
New cards

OSI Model

Seven-layer framework for network protocol services.

14
New cards

Application Layer

User interface for accessing network services.

15
New cards

SMTP

Protocol for sending email.

16
New cards

FTP

Protocol for transferring files over the Internet.

17
New cards

HTTP

Protocol for transferring hypertext documents.

18
New cards

HTTPS

Secure version of HTTP using encryption.

19
New cards

TLS (write out acronym too)

Transport Layer Security - Encryption layer ensuring secure communications.

20
New cards

Phishing Attacks

Fraudulent attempts to obtain sensitive information.

21
New cards

Injection Attacks

Malicious code inserted into valid input fields.

22
New cards

Cross-Site Scripting

Injecting scripts into web pages to steal data.

23
New cards

Session Hijacking

Attacker impersonating a user by stealing session cookies.

24
New cards

Man-in-the-Middle Attack

Interception of communication to steal data.

25
New cards

Unencrypted Data Exposure

Sensitive data sent over unsecured connections.

26
New cards

Source Code Inspection

Reviewing webpage code for hidden information.

27
New cards

robots.txt

File listing pages excluded from search engines.

28
New cards

Path Traversal

Accessing system files by manipulating URLs.

29
New cards

Referrer Spoofing

Faking originating website to bypass restrictions.

30
New cards

Traffic Encryption

Securing network traffic to prevent monitoring.

31
New cards

Multi-factor Authentication

Security requiring multiple forms of verification.

32
New cards

Short Timeouts

Ending sessions after inactivity to enhance security.

33
New cards

Log Analysis

Skill to trace attack origins and compromised systems.

34
New cards

System Logs

Records of system activity and user behaviour.

35
New cards

Authentication Logs

Track login attempts and access success or failure.

36
New cards

Security Logs

Focus on security events like privilege escalation.

37
New cards

Application Logs

Capture data from specific applications or programs.

38
New cards

Timestamp

Exact time when an event occurred.

39
New cards

Event ID

Unique identifier for specific event types.

40
New cards

Username

Account attempting access in authentication logs.

41
New cards

Source IP Address

Origin of the login request.

42
New cards

Login Type

Method of access, e.g., local or remote.

43
New cards

Indicators of Compromise (IoC)

Signs of potential security breaches.

44
New cards

Anomalous Login Times

Logins occurring at unusual hours.

45
New cards

Failed Login Attempts

Repeated failures from the same IP address.

46
New cards

Privilege Escalation

Regular users gaining unauthorised elevated privileges.

47
New cards

Unauthorized Access Attempts

Access attempts from suspicious IP addresses.

48
New cards

Brute-Force Attack

Systematic guessing of user passwords.

49
New cards

Tor Exit Nodes

Final relay points in the Tor network.

50
New cards

Log Management Systems

Tools for automating log aggregation and detection.

51
New cards

Event Viewer

Windows tool for viewing system logs.

52
New cards

PowerShell

Command-line tool for advanced log filtering.

53
New cards

Scheduled Tasks

Unauthorised jobs set to run on a system.

54
New cards

Startup Modifications

Changes to startup files or registry entries to maintain access post-reboot.

55
New cards

C2 Communication

Outbound connections to external command servers.

56
New cards

Log Investigation Report

Document summarising findings and recommendations.

57
New cards

Impact Assessment

Evaluation of compromised systems and data.

58
New cards

Network Packet

Small data unit sent over a network.

59
New cards

Packet

Data broken into units for transmission.

60
New cards

Header

Metadata including source/destination IP addresses.

61
New cards

Payload

Actual data being transmitted in a packet.

62
New cards

tcpdump

Tool for capturing network packets.

63
New cards

pcap

Packet capture file format for storing data.

64
New cards

pcapng

Next-generation packet capture file format.

65
New cards

Wireshark

Open-source tool for packet analysis.

66
New cards

Packet Filtering

Narrowing data by IP, port, or protocol.

67
New cards

Identifying Protocols

Detecting protocols like HTTP or IRC.

68
New cards

Follow TCP/UDP Streams

Reconstructing conversations from packet captures.

69
New cards

Pattern Matching

Filtering packets by specific values or metadata.

70
New cards

List Conversations

Identifying all conversation streams in captures.

71
New cards

Export

Isolating and exporting specific conversation streams.

72
New cards

Draw Conclusions

Extracting data from streams for analysis.

73
New cards

Command-and-Control (C2) Traffic

Remote control of compromised machines by attackers.

74
New cards

Netcat Reverse Shells

Interactive access method for attackers.

75
New cards

IRC Communication

Using Internet Relay Chat for command reception.

76
New cards

File Transfers

Downloading malicious payloads using commands like wget.

77
New cards

Web Shells

Scripts providing ongoing access to compromised systems.

78
New cards

Sniffing Tools

Tools like Wireshark for analysing network traffic.