This layer of the OSI or TCP/IP model transmits data via protocols like TCP or UDP.
What is the Transport Layer?
This layer 1 device connects multiple devices on a network. It receives data on one port and broadcasts it to all other ports.
What is a Hub?
This is malware disguised as a legitimate program to trick users into downloading and executing.
What is Trojan?
This protocol uses Port 25 or 587 and sends mail.
What is SMTP (Simple Mail Transfer Protocol)?
These are the 5 pillars of cybersecurity.
What is Confidentiality, Integrity, Availability, Non-Repudiation, and Authenticity?
This layer of the OSI or TCP/IP model physically transmits data over a network.
What is the Network layer?
This layer 1 device received, regenerates, and retransmits raw signals to extend networks physical range.
What is a Repeater?
These malwares are similar but ___ is self-replicating that spreads without human intervention and ___ relies on a user to run the infected program to spread.
What is worm and virus?
This port uses port 110 or 995 and receives mail.
What is POP 3(Post Office Protocol v3)?
This issues maintains PKCs.
What is PKI (Public Key Infrastructure)?
These 3 layers of the OSI model are combined to make the application layer of the TCP/IP model
What is layer 5 (session), 6 (presentation), and 7 (application)?
This layer 6 device acts as a gateway between a user and the internet and adds security.
What is a Proxy Server?
This attack cracks passwords by systematically entering every word in a given word list.
What is Dictionary Attack?
This port uses port 20 to transfer and port 21 to control.
What is FTP (File Transfer Protocol)?
This provides digital signatures and encryption capabilities.
What is PKC (Public Key Certificates)?
The ____ Model is a theoretical framework for design, while the ____ Model defines actual protocols in use.
What is TCP/IP and OSI?
This layer 3 device connects multiple networks and forwards data packets to destination. It is essential for using the internet.
What is a Router?
Attackers may use this in conjunction with a cyber attack to gain unauthorized higher level permissions.
What is Privilege Escalation?
This protocol uses port 80 or 443 to send information from websites
What is HTTP/S (HyperText Transfer Protocol/Secure)?
A digital signature is an example of this cyber-security pillar.
What is non-repudiation?
These are the 3 layers of routing.
What is the Access layer, the Distribution layer, and the Core layer?
This device operates on layers 3, 4, and 7. It is set up to permit or deny traffic and is used to add security.
What is a Firewall?
Attackers may use this in conjunction with other attacks to gain persistence on a system.
What is Backdoor?
These two protocols all connections between networks. ____ is encrypted and uses port 22. _____ is in plain text and uses port 23.
What is SSH (secure Shell) and Telnet?
Version control is an example of this pillar.
What is integrity?