Plebe Cyber Final

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

The Common Cyber Definition

Domain characterized by the 'human use of electronics.

2
New cards

The DoD Cyber Definition

A global domain within the information environment

3
New cards

Cyberspace Model Layers

Cyberpersona, logical, physical.

4
New cards

Components of Computer Architecture

Hardware, OS, application, user

5
New cards

Major physical components of a computer

CPU, storage, peripherals

6
New cards

Three criteria that influences the paradigm of storage device?

Cost, size, speed

7
New cards

Window OS leverages blank to determine the application to use to open the file with

file extensions

8
New cards

Most Significant Bit (MSB) is always to the blank

9
New cards

Least significant Bit (LSB) is always to the blank

10
New cards

blank bits in a byte, blank hex in a byte

eight, two

11
New cards

Moore’s Law

Principle that Integrated Circuits double every two years.

12
New cards

Name four services provided by the OS?

File Operations, Network Connections, User accounts, and Process Control.

13
New cards

Three ways for programs and users to access the services provided by the OS?

Shell, GUI, API

14
New cards

Type parts of a shell command?

Name, option, argument

15
New cards

World Wide Web

Vast collection of servers and clients communicating over the internet

16
New cards

Website

Collection of one or more files that you see in a browser

17
New cards

Web server

Exist to supply website content

18
New cards

Web client

Users that leverage applications

19
New cards

Three parts of a URI in order?

Scheme, authority, path

20
New cards

Parts of a HTML code in order?

Element, Start tag, attribute, inner html, end tag.

21
New cards

blank IP addresses are for internal use

Private

22
New cards

blank IP addresses are for external use

Public

23
New cards

What does ping do?

Sends ICMP request to see if an IP is responding.

24
New cards

What does tasklist do?

Outputs running processes.

25
New cards

What does arp do?

Displays IP-MAC resolution.

26
New cards

What does ipconfig do?

Displays network information

27
New cards

What does nslookup do?

Queries the name server

28
New cards

What does tracert do?

Sends ICMP request to each hop until final destination

29
New cards

What does netstat do?

Displays network connections

30
New cards

blank standards are used for wired networks?

Ethernet

31
New cards

blank standards are used for wireless networks?

WiFi

32
New cards

Five steps of risk management process?

Monitor, identify, analyze, prioritize, address

33
New cards

Encryption

Scramble a message in a way that only the intended recipient can unscramble it.

34
New cards

Hashing

Taking an input and producing a fixed sized output

35
New cards

Asymmetric encryption

Two keys

36
New cards

Symmetric encryption

Single key

37
New cards

Modern problems digital signatures address?

Integrity and non-repudiation

38
New cards

Cybersecurity challenge presented by asymmetric key pairs?

Owner of the public key has not been validated against the owner’s identity.

39
New cards

Digital certificates provide a system of blank

Trust

40
New cards

Name of the third party that verifies and issues digital certificates?

Certificate authority

41
New cards

Network security technologies that are leveraged in boundary perimeter?

IDS, IPS, firewall

42
New cards

Term used for military strategy that seeks to delay rather than prevent?

Defense-In-Depth

43
New cards

Hosts within DMZ are assigned blank addresses that can be accessed by other blank -connected computers?

Public, internet

44
New cards

Main difference between passive and active reconnaissance?

Activities that could potentially result in attributing an adversary.