Unsecured user accounts, misconfigured internet services and network equipment are all examples of what kind of vulnerability?
What is Technological?
Name 2 of the 3 types of malware
What are trojan horses, viruses, and worms?
This hardware sits in between two or more networks, controls the traffic between them, and helps prevents unauthorized access
What is a Firewall?
This protocol is used in place of telnet for encrypting traffic on devices for secure remote access
What is SSH?
Five routers walk into a bar. Who gets the car keys
What is The Designated Router?
This kind of threat is described when a threat actor sends you a virus that can reformat your hard drive
What is data loss or manipulation?
This disabling or corruption of networks, systems, or services is done through multiple coordinated sources
What is Distributed Denial of service?
This habit is the most effective way of protecting against data loss
What is keeping frequent backups?
A device must have a unique _____ other than the default to support SSH
What is hostname?
What do they call a group of network engineers
An outage
This kind of threat is described when a threat actor impersonates another person to obtain credit information about that person
What is identity theft?
The type of attack that uses discovery and mapping of systems, services, or vulnerabilities
What are reconnaissance attacks?
List the 2 of the 4 types of Firewalls
What is, packet filtering, application filtering, URL filtering, and stateful packet inspection (SPI)?
This global configuration command prevents unauthorized individuals from viewing plaintext passwords in the configuration file
What is service password-encryption?
WHO HAS ANY GOOD ARP JOKES!?
(First to laugh or respond “me” gets the point)
This kind of threat is described when a threat actor overloads a network to deny other users network access
What is disruption of service?
The type of attack that uses unauthorized manipulation of data, system access, or user privileges
What are access attacks?
List the triple A acronym
What is Authentication, Authorization, and Accounting?
To create a strong password name 4 of these 6 guidelines
length of at least eight characters, complex, avoid repetition or commonalities, misspell, change often, do not write down
How did pirates communicate before the internet?
Pier to pier communication
Name 3 of the 4 classes of physical threats
What are hardware, environmental, electrical, and maintenance?
A threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties in this type of access attack
What is man in the middle?
This can recognize and filter out specific types of attacks such as DoS attacks
What is Stateful packet inspection (SPI)
This cisco command is used to show all open ip ports
What is show ip ports all?
How do you catch an ether bunny?
With an ethernet