This is the name of the layer that establishes, manages, and terminates sessions between applications
Session Layer
Command Line Interface
What does SSH stand for?
Secure Shell
This is the most common type of malware after virus, but it spreads independently and self-replicates automatically
Worm
How many bits are there in one byte?
8
This is the name of the layer that provides the interface between the applications and the network
Application Layer
LAN
Local Area Network
What does FTP stand for?
This is a type of malware that downloads onto a computer disguised as a legitimate program.
Trojan Horse
What device did Dr. Mayaada call the "King of Network"
Switch
Layer that is responsible for reliable transmission of data segments between nodes on the network
Transport Layer
MAN
Metropolitan Area Network
What does DHCP stand for?
Dynamic Host Configuration Protocol
This is a malicious technique used by cyber criminals to gather sensitive information (credit card data, usernames and passwords, etc) from users
Phishing
How many bits of data are there in an IPv4?
32 bits
Layer that performs routing and forwarding of packets across different networks
Network Layer
VPN
Virtual Private Network
What does HTTPS stand for?
Hypertext Translation Protocol Secure
This is a weakness in an IT system that can be exploited by an attacker to deliver a successful attack
Vulnerability
How many bits of data are there in an IPv6?
128 bits
Layer that converts data into bits for transmission and provides error detection and correction
Data Link Layer
CIA Triad
Confidentiality, Integrity, Availability
What does SMTP stand for?
Simple Mail Transfer Protocol
This is a form of sophisticated phishing whose objective is to collect sensitive data about a target. It usually goes after high-profile, famous and wealthy targets, such as celebrities, CEO’s, top-level management and other powerful or rich individuals
This type of Plan in an organization provides a prevention and recovery system for potential threats, like natural disasters, cyber attack etc?
Layer that provides logical addressing and path selection for network devices
Network Layer
MAC
Media Access Control
What does DNS stand for?
Domain Name Service
This type of attack is deployed by cyber-criminals who have high level of expertise and important resources to infiltrate a network. They usually use this type of attack to target large organisations seeking to retrieve economic or financial information. Give not just abbreviation.
APT = Advanced Persistent Threat
This type of Plan in an organization describes how organization can quickly resume work after incident?
DRP = Disaster Recovery Plan
Layer that provides data representation, encryption, and compression services
Presentation Layer
APT
Advanced Persistent Threat
What does TFTP stand for?
Trivial File Transfer Protocol
How is a piece of malicious code that is designed to execute a specific action on a target system called?
Payload
What was the name of the first worm in the history of cybersecurity?
The Creeper
How is PDU (Protocol Data Unit) called in Presentation and Application layers?
Data or Message(s)
PDU
Protocol Data Unit
What is the port number of POP3 protocol?
110
How do you call a group of computers that have been compromised by malware to run a command-and-control agent to perform illicit actions remotely
Botnet
How do you call a method of erasing data from magnetic storage media (like hard drives) by exposing them to a powerful magnetic field?
Degaussing
How is PDU (Protocol Data Unit) called in Network Layer?
Packet
SIEM
Security Information & Event Management
What is port number of SSH protocol?
22
Type of attack where a hacker deliberately overflows a computer program's data buffer that leads to overwriting of nearby memory or letting the malicious code to infiltrate victims computer?
Name at least three stages in Cyber Kill Chain?
Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, Actions and Objectives
What layers are "missing" in TCP/IP model comparing to OSI model?
Presentation, Session, Data link and Physical.
SOAR
Security Orchestration Automation & Response
What are port numbers of HTTP and HTTPS protocols (name both numbers)
80/443
This type of phishing attack happens over VoIP?
Vishing (VoIP = Voice Over Internet Protocol used by Skype, WhatsApp, Zoom etc)
What is the name of the precomputed table for reversing cryptographic hash functions, usually for cracking password hashes?
Rainbow table