OSI vs TCP/IP
AAA
Attacks 2: Electric Boogaloo
Virtualization/Cloud
Cryptography
200
The first two layers of the OSI model are called what on the TCP/IP model?

Network

200

Ability to permit or deny privileges

Access Control

200

An attack where you manipulate a person to do something for you

Social Engineering

200

A machine created and accessed through software

VM (Virtual Machine)

200

A decentralized ledger that records and verifies transactions between two parties

Blockchain

400

Routers and IP addresses function at what layer of the OSI model?

Layer 3 (Network)

400

Process of controlling access to resources such as computers, files, or printers

Authorization

400

An attack that will bring a server or service down due to an overload of traffic

DDoS

400

The software that hosts your guest operating systems/hardware

Hypervisor

(What did we use for the Hack Box?)

400

Verifying the data is legitimate is called this

Digital Signatures

600

Which layer is the same for both models?

Transport

600

Maintaining a record of a subject's activity within the network

Auditing

600

These computers are utilized for DDoS attacks

Zombie (Botnet)

600

A main reason to use virtualization, which disperses the work load between many devices

Load Balancing

600

A type of encryption that uses the same key for encryption and decryption

Symmetric Encryption

800

The two layers used to put data on the wire

Layer 1 and 2

800

An access control principle which implements multiple layers of security

Defense-in-Depth

800

An attack that will grant you greater access than you should have

Privilege Escalation

800

A cloud that can be accessed by anyone

Public Cloud

800

The process of converting data values into an encryption

Hashing

1000

SSL operates at which layer of the OSI model?

Layer 5 (Session)

1000

Term for validating a subjects identity

Authentication

1000

Remaps the IP and MAC addresses

ARP Poisoning

1000

A virtual service that can be utilized by companies that allows them to backup data offsite

Cloud Storage

1000

The government standard hash algorithm

SHA (Secure Hash Algorithm)

M
e
n
u