1/43
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The Common Cyber Definition
Domain characterized by the 'human use of electronics.
The DoD Cyber Definition
A global domain within the information environment
Cyberspace Model Layers
Cyberpersona, logical, physical.
Components of Computer Architecture
Hardware, OS, application, user
Major physical components of a computer
CPU, storage, peripherals
Three criteria that influences the paradigm of storage device?
Cost, size, speed
Window OS leverages blank to determine the application to use to open the file with
file extensions
Most Significant Bit (MSB) is always to the blank
Least significant Bit (LSB) is always to the blank
blank bits in a byte, blank hex in a byte
eight, two
Moore’s Law
Principle that Integrated Circuits double every two years.
Name four services provided by the OS?
File Operations, Network Connections, User accounts, and Process Control.
Three ways for programs and users to access the services provided by the OS?
Shell, GUI, API
Type parts of a shell command?
Name, option, argument
World Wide Web
Vast collection of servers and clients communicating over the internet
Website
Collection of one or more files that you see in a browser
Web server
Exist to supply website content
Web client
Users that leverage applications
Three parts of a URI in order?
Scheme, authority, path
Parts of a HTML code in order?
Element, Start tag, attribute, inner html, end tag.
blank IP addresses are for internal use
Private
blank IP addresses are for external use
Public
What does ping do?
Sends ICMP request to see if an IP is responding.
What does tasklist do?
Outputs running processes.
What does arp do?
Displays IP-MAC resolution.
What does ipconfig do?
Displays network information
What does nslookup do?
Queries the name server
What does tracert do?
Sends ICMP request to each hop until final destination
What does netstat do?
Displays network connections
blank standards are used for wired networks?
Ethernet
blank standards are used for wireless networks?
WiFi
Five steps of risk management process?
Monitor, identify, analyze, prioritize, address
Encryption
Scramble a message in a way that only the intended recipient can unscramble it.
Hashing
Taking an input and producing a fixed sized output
Asymmetric encryption
Two keys
Symmetric encryption
Single key
Modern problems digital signatures address?
Integrity and non-repudiation
Cybersecurity challenge presented by asymmetric key pairs?
Owner of the public key has not been validated against the owner’s identity.
Digital certificates provide a system of blank
Trust
Name of the third party that verifies and issues digital certificates?
Certificate authority
Network security technologies that are leveraged in boundary perimeter?
IDS, IPS, firewall
Term used for military strategy that seeks to delay rather than prevent?
Defense-In-Depth
Hosts within DMZ are assigned blank addresses that can be accessed by other blank -connected computers?
Public, internet
Main difference between passive and active reconnaissance?
Activities that could potentially result in attributing an adversary.