What are the three different parts of a URL?
Hostname, Domain Name, and Top-Level Domain
What is the form of malware that attaches itself to a file and uses it to spread.
Computer Virus
What is the term used to describe the initial method used to infiltrate a system or network?
Threat Vector
How does an on path attack work?
An attacker places themself between two devices to intercept or modify data
What is a small collection of data used to authenticate a user to a website instead of having to login every time?
Cookie
Write an example of an Internet of Things (IoT) Device.
Anything that has Wi-Fi or Bluetooth connectivity ("Smart" devices)
This form of malware is programmed to "go off" only under a specific set of conditions or at a specific time. What is it?
Logic bomb
Who is the client in a client-based attack?
Network attacks can be classified by two different types. Name those two types.
Passive and Active
Name one of the ways an IP address and MAC address are different.
MAC address uses letters, hyphens [ - ] and colons [ : ]
IP addresses use periods [ . ]
This type of Phishing attack uses QR codes. What's it's name?
Qishing
What is not technically a form of malware, but still consumes system resources?
Bloatware
This type of threat vector targets applications or systems that are no longer supported by their developer.
System-Based
Rate limiting (also IPS and IDS)
What is the function of the Service Set Identifier (SSID)?
Functions as the name of a Wi-Fi source
What attack targets specific devices to get disconnected from a network?
Deauthentication attack
What is the purpose of a rootkit?
Gain administrative access to a person's device
What is a Zero Day Attack?
An attack that has no current fixes because nobody was aware of it until an accident occurred
What is the function of the Domain Name System (DNS)?
To translate a domain name to an IP address
Write down the three pillars of multifactor authentication.
Something you know, Something you are, Something you have
What number am I thinking of? Write it down
43
Describe the use for cryptomalware
Uses victim's device to generate CPU cycles to generate encryption keys and basically mine cryptocurrency
Describe an attack surface.
The sum of all possible vulnerabilities on a network or device
Name one of the methods to defend against a wireless attack.
Change any default account login information on your router/network | Use strong encryption | Update your device’s firmware to maintain it’s security | Put IoT devices on a guest network | Keep the location of your router secure
What is the difference between misinformation and disinformation?
Misinformation is spread unintentionally, while disinformation is spread intentionally