XSS Stands for what?
What is Cross Site Scripting
The smallest unit of data transmitted over a network.
What is a packet
This protocol is used for sending mail between devices and is historically prone to vulnerabilities.
What is SMTP
The C in the CIA triad stands for...?
A commonly used language for managing and manipulating databases and information
This command-line tool measures the time it takes for a packet to travel to a destination and return.
What is Ping?
This is a type of hacker who attempts to access or compromise systems at the request of the system administrator
What is a penetration tester?
This device directs packets to their destination in a network.
What is a Router
This type of denial-of-service attack overwhelms a server by sending an excessive amount of ping requests.
What is a Ping Flood
This browser tool lets you view the HTML, CSS, and JavaScript of a website in real-time.
What are developer tools / inspect element.
This type of server vulnerability occurs when users access restricted parts of a website by manually changing URLs.
What is forceful browsing?
the physical and logical arrangement of devices and connections within a computer network
What is Network Topology?
A program that can be used to intercept and investigate network packets
What is Wireshark
This tool identifies the owner of a domain name and their contact information.
What is Whois?
This practice ensures that only necessary services run on a server to reduce vulnerabilities.
What is Server Hardening
This unique identifier, assigned to network interface cards (NICs), is used to distinguish devices on a local network.
What is a MAC address?
The process by which inputs are "cleansed" of potentially harmful database queries
Wireshark can capture packets in this specific format for detailed analysis.
What is PCAP format
These files can contain sensitive information about device activity
What are log files
Which part of the CIA triad can make a network susceptible to a DDOS attack?
What is availability?