OSI Model
Darn Abbreviations
Protocols
Threats and Definitions
Random Facts
100

This is the name of the layer that establishes, manages, and terminates sessions between applications

Session Layer

100
CLI

Command Line Interface

100

What does SSH stand for?

Secure Shell

100

This is the most common type of malware after virus, but it spreads independently and self-replicates automatically


Worm

100

How many bits are there in one byte?

8

200

This is the name of the layer that provides the interface between the applications and the network

Application Layer

200

LAN

Local Area Network

200

What does FTP stand for?

File Transfer Protocol
200

This is a type of malware that downloads onto a computer disguised as a legitimate program.


Trojan Horse

200

What device did Dr. Mayaada call the "King of Network"

Switch

300

Layer that is responsible for reliable transmission of data segments between nodes on the network

Transport Layer

300

MAN

Metropolitan Area Network

300

What does DHCP stand for?

Dynamic Host Configuration Protocol

300

This is a malicious technique used by cyber criminals to gather sensitive information (credit card data, usernames and passwords, etc) from users


Phishing

300

How many bits of data are there in an IPv4?

32 bits

400

Layer that performs routing and forwarding of packets across different networks

Network Layer

400

VPN

Virtual Private Network

400

What does HTTPS stand for?

Hypertext Translation Protocol Secure

400

This is a weakness in an IT system that can be exploited by an attacker to deliver a successful attack


Vulnerability

400

How many bits of data are there in an IPv6?

128 bits

500

Layer that converts data into bits for transmission and provides error detection and correction

Data Link Layer

500

CIA Triad

Confidentiality, Integrity, Availability

500

What does SMTP stand for?

Simple Mail Transfer Protocol

500

This is a form of sophisticated phishing whose objective is to collect sensitive data about a target. It usually goes after high-profile, famous and wealthy targets, such as celebrities, CEO’s, top-level management and other powerful or rich individuals


Whaling
500

This type of Plan in an organization provides a prevention and recovery system for potential threats, like natural disasters, cyber attack etc?

BCP = Business Continuity Plan
600

Layer that provides logical addressing and path selection for network devices

Network Layer

600

MAC

Media Access Control

600

What does DNS stand for?

Domain Name Service

600

This type of attack is deployed by cyber-criminals who have high level of expertise and important resources to infiltrate a network. They usually use this type of attack to target large organisations seeking to retrieve economic or financial information. Give not just abbreviation. 


APT = Advanced Persistent Threat

600

This type of Plan in an organization describes how organization can quickly resume work after incident?

DRP = Disaster Recovery Plan

700

Layer that provides data representation, encryption, and compression services

Presentation Layer

700

APT

Advanced Persistent Threat

700

What does TFTP stand for?

Trivial File Transfer Protocol

700

How is a piece of malicious code that is designed to execute a specific action on a target system called?


Payload

700

What was the name of the first worm in the history of cybersecurity?

The Creeper

800

How is PDU (Protocol Data Unit) called in Presentation and Application layers?

Data or Message(s)

800

PDU

Protocol Data Unit

800

What is the port number of POP3 protocol?

110

800

How do you call a group of computers that have been compromised by malware to run a command-and-control agent to perform illicit actions remotely

Botnet

800

How do you call a method of erasing data from magnetic storage media (like hard drives) by exposing them to a powerful magnetic field?

Degaussing

900

How is PDU (Protocol Data Unit) called in Network Layer?

Packet

900

SIEM

Security Information & Event Management

900

What is port number of SSH protocol?

22

900

Type of attack where a hacker deliberately overflows a computer program's data buffer that leads to overwriting of nearby memory or letting the malicious code to infiltrate victims computer?

Buffer Overflow
900

Name at least three stages in Cyber Kill Chain?

Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, Actions and Objectives

1000

What layers are "missing" in TCP/IP model comparing to OSI model?

Presentation, Session, Data link and Physical. 

1000

SOAR

Security Orchestration Automation & Response

1000

What are port numbers of HTTP and HTTPS protocols (name both numbers)

80/443

1000

This type of phishing attack happens over VoIP?

Vishing (VoIP = Voice Over Internet Protocol used by Skype, WhatsApp, Zoom etc)

1000

What is the name of the precomputed table for reversing cryptographic hash functions, usually for cracking password hashes? 

Rainbow table

M
e
n
u