2/5
The advantages of _____ is that they are cheap and great for small networks
Hubs
what is the best description of an Access Control List?
It is a set of rules to govern what type of traffic to let in to a network.
If you wanted to allow any IP if its protocol 80 or 25 but deny everything else. You would use this security tool.
Firewall
to write a python script that can run terminal commands you would import this library
Import OS
Before they were officially added to Minecraft on June 30, 2011 this item was first introduced as a mod
Pistons
In general, a bridge or an aggregate switch acts as ___s to join various parts of the ___ together.
act as intermediaries to join various parts of the network together.
The rule of 'implicit deny' essentially states that
all traffic will be denied unless specifically let in.
This firewall will cover an entire group or subnet of machines
network-based
in Linux this program is used to preform a verity of attacks on hashed passwords
Hashcat
This type of plant commonly found in growing all around the US in the summer can help rid your body of salt and has anti-inflammatory property's
Dandelion
As a network technician, you are trying to avoid flooding attacks. To do so you would use this security mechanism
Flood Guard
You want to implement antispoofing on a router that is sitting outside of your network. How would you best meet this goal?
Prevent all incoming traffic from private IP addresses.
This firewall is meant to protect a single host.
Host-based
Just like the "ifconfig" command in Linux is used to configure network interfaces. This command is used to configure bluetooth devices.
hciconfig
This type of learning can be used to master anything extremely quickly
Meta Learning (learning how to learn)
This kind of prevention marks what switch the packet has came from so it cant be sent back
Loop Prevention
In a spoofing attack, an attacker
attempts to masquerade as someone or something else.
(2 answers, points will be split if one answer is correct)
This firewall is subject to flooding attacks.
This firewall is subject to spoofing attacks.
flooding attacks. → Stateful firewall
spoofing attacks. → Stateless firewall
in the command
"chmod 644 myfile.txt"
this sets the permissions of this file to be what for the owner?
Read write
This sport is the most popular indoor sport in the world. Its name is also a ablaut reduplication.
Ping Pong
(ablaut reduplication is the term for repeating a word with a different vowel to make a phrase)
The primary benefit of a switch over a hub is that it.
uses unicast.
Marco plans to attack a network by intercepting incoming packets, copying the IP address, and then sending his own packets with the copied IP address. This type of attack is known as.
Spoofing
An organization's firewall has been breached. Security analysts discovered that the attackers used the TCP protocol to get into the system without having performed the 3-way handshake. Which type of firewall would aid in solving this problem?
Stateful firewall
Given the following obfuscated code discern what the code is doing:
first_num = int(input("Enter a number: "))
second_num = bin(first_num)
print(first_num, "is", second_num)
converts decimal numbers to binary
a standard deck of playing cards can have this many possible combinations when shuffled.
8x1067 Which is more possible combinations than atoms on earth. No one has or likely ever will hold the exact same arrangement of 52 cards