Cyber Security Overview and Tools
39 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of mode is typically used to transfer files to another server?

  • Asynchronous mode
  • Secure mode
  • Binary mode (correct)
  • Interactive mode
  • What is the primary purpose of baseline files?

  • To automatically backup data
  • To provide a snapshot of system performance (correct)
  • To test network connectivity
  • To record unauthorized access attempts
  • In the iptables command, what does the --j option stand for?

  • Jump (correct)
  • Judge
  • Join
  • Justify
  • Why would a hacker use a ZenMap scan on a network?

    <p>To identify open ports and services</p> Signup and view all the answers

    What does the whoami command do?

    <p>Displays the current user's identity</p> Signup and view all the answers

    When using the approve everything by default method, what should the last iptables rule specify?

    <p>DROP all traffic</p> Signup and view all the answers

    What command is used to retrieve a file from a server?

    <p>GET</p> Signup and view all the answers

    What information does a Tenable Nessus scan provide to pen testers?

    <p>System vulnerabilities</p> Signup and view all the answers

    Which of the following types of malware operates by tricking users into clicking on malicious links or attachments?

    <p>Trojan Horse</p> Signup and view all the answers

    What is the main purpose of the tool 'tracert' in a cybersecurity investigation?

    <p>To trace the path packets take to a network destination</p> Signup and view all the answers

    Which type of attack involves overwhelming a server with traffic to disrupt services?

    <p>DDoS</p> Signup and view all the answers

    In terms of cybersecurity, what distinguishes a script kiddie from a more advanced hacker?

    <p>Script kiddies utilize existing tools and scripts without full understanding</p> Signup and view all the answers

    Which of the following security measures should be implemented to protect sensitive data in default folders?

    <p>Implement strong access controls and encryption</p> Signup and view all the answers

    What does the 'whois' tool primarily help with in cybersecurity investigations?

    <p>Identifying the owner of a domain name</p> Signup and view all the answers

    Which type of hacker is motivated by political or social causes and uses illegal activities to promote their agenda?

    <p>Hacktivist</p> Signup and view all the answers

    Which of the following is NOT a common motivation or goal for white hat hackers?

    <p>Gaining financial rewards through illegal activities</p> Signup and view all the answers

    Which hash function produces the output '48E195AB'?

    <p>The quick brown fox</p> Signup and view all the answers

    What is the main advantage of using a static IP address?

    <p>It remains constant and does not change.</p> Signup and view all the answers

    Which of the following best describes Network Address Translation (NAT)?

    <p>A technique that allows multiple devices to share a single IP address.</p> Signup and view all the answers

    What is typically the primary challenge in establishing identity in cyberspace?

    <p>Difficulty in verifying the authenticity of online personas.</p> Signup and view all the answers

    Why is it crucial to take an image of a drive or device during an investigation?

    <p>To ensure evidence is preserved without alteration.</p> Signup and view all the answers

    What is the term used for data that is stored and not actively being moved or processed?

    <p>Data at rest</p> Signup and view all the answers

    Which encryption method uses a single key for both encryption and decryption?

    <p>Private key encryption</p> Signup and view all the answers

    What is the main purpose of cryptography?

    <p>To protect information</p> Signup and view all the answers

    Which of the following describes a substitution cipher?

    <p>Replaces each letter with another letter</p> Signup and view all the answers

    Which type of encryption utilizes two keys, one for encryption and another for decryption?

    <p>Asymmetric encryption</p> Signup and view all the answers

    Which of the following is NOT an example of data in transit?

    <p>A bank statement stored on a computer</p> Signup and view all the answers

    What is the role of an encryption key in cryptography?

    <p>To convert ciphertext back to plaintext</p> Signup and view all the answers

    Which algorithm is primarily associated with asymmetric encryption?

    <p>RSA</p> Signup and view all the answers

    What does ciphertext represent in the context of cryptography?

    <p>Encoded data that is not readable without decryption</p> Signup and view all the answers

    Which type of encryption requires the same key for both encrypting and decrypting messages?

    <p>Symmetric key encryption</p> Signup and view all the answers

    What is one of the advantages of asymmetric encryption?

    <p>It allows secure key exchange over an insecure channel.</p> Signup and view all the answers

    Which command is used to show the contents of a file?

    <p>cat</p> Signup and view all the answers

    What is one crucial factor to begin the encryption process on a hard drive?

    <p>A password must be provided.</p> Signup and view all the answers

    What is the primary function of a BitLocker recovery key?

    <p>To allow access to the encrypted drive in case the password is lost.</p> Signup and view all the answers

    What must you verify about a computer or device before leaving the scene during an investigation?

    <p>If the devices are powered on or off.</p> Signup and view all the answers

    Which method is often employed to crack container passwords?

    <p>Brute force dictionary method.</p> Signup and view all the answers

    What is important to document regarding the position of a mouse during an investigation?

    <p>It might suggest user activity at the time of evidence collection.</p> Signup and view all the answers

    During transport, what should be considered to protect digital evidence?

    <p>Environmental conditions and physical stability.</p> Signup and view all the answers

    Study Notes

    Cyber Security Overview

    • Network Topology: Structure of network connections, can impact performance and security.
    • Types of Malware:
      • Virus: Infects files and spreads via attachments.
      • Worm: Self-replicating malware that spreads over networks without a host program.
      • Backdoor: Provides unauthorized remote access to systems.
      • Spyware: Monitors user activities and collects information.
      • Trojan Horse: Disguised as legitimate software, can damage systems once executed.
      • Adware: Displays unwanted advertisements, often bundled with free software.
      • Popup: Interrupts user experience by creating pop-up windows, can be related to adware.
    • Operating Systems: Base software managing computer hardware and software resources.

    Cyber Security Investigation Tools

    • Whois: Provides registration details of a domain to identify the owner.
    • Nslookup: Resolves domain names to IP addresses, useful for mapping networks.
    • Tracert: Traces the path data takes to reach a specific server, highlighting potential network issues.
    • Netstat: Displays active connections, offering insights into current network traffic and potential issues.

    Malware and Cyber Attacks

    • "ILOVEYOU" Worm: A type of malware that spread via email, it exploited human curiosity, causing massive data loss and system damage.
    • DDoS Attack: Distributes denial-of-service attacks across multiple systems to overwhelm a target, rendering it unavailable.

    Hacker Motivations

    • White Hat Hackers: Ethical hacking to improve security; aim to find and fix vulnerabilities.
    • Black Hat Hackers: Malicious intent; exploit vulnerabilities for personal gain.

    Enhancing Security Against Malware

    • Increased Risk Factors:
      • Opening unsolicited email attachments.
      • Downloading software from untrustworthy sources.
      • Ignoring software updates.
      • Lack of robust antivirus protection.

    Additional Cyber Security Concepts

    • Directory Locations for Servers:
      • Default IIS files often stored in C:\inetpub\wwwroot.
      • Logs found in subfolders for monitoring server activity.
    • Forceful Browsing: Attempts to access directories that are not directly linked, enabling potential unauthorized access.
    • Firewall Types:
      • Network Firewalls: Protect entire networks.
      • Host Level Firewalls: Protect individual devices.

    Digital Forensics Fundamentals

    • Handling Digital Evidence: Follow a strict process for documenting and preserving evidence in digital forensic investigations.
    • Live Response: Technique for collecting evidence from a powered-on device, often necessary during active incidents.

    Cryptography Basics

    • Encryption Types:
      • Symmetric Key Encryption: Same key for encryption and decryption.
      • Asymmetric Encryption: Uses a pair of keys (public and private) for secure communications.
    • Digital Data:
      • Data at Rest: Stored data (e.g., files on disk).
      • Data in Transit: Data being transferred (e.g., emails).

    Important Commands & Protocols

    • Commands:
      • whoami: Displays the current user account.
      • ipconfig: Shows the network configuration of the device.
    • Protocols: Each layer of the OSI model corresponds to various protocols defining how data is transferred over networks.

    Security Protocol Implementation

    • FTP Security: Should limit anonymous access and only be permitted under specific scenarios to prevent unauthorized file transfers.
    • Log File Management: Important for tracking access and identifying potential security breaches; should be securely stored and monitored.

    Penetration Testing Tools

    • Nessus and Metasploit: Commonly used tools by penetration testers for vulnerability scanning and exploitation respectively.
    • ZenMap Scanner: Provides a visual map of the network and identifies potential weaknesses.

    This outline provides a comprehensive view of foundational cybersecurity concepts, investigation tools, types of attacks, hacker motivations, encryption methods, and essential commands useful in cybersecurity practices.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Explore the essential concepts of Cyber Security, including network topology, types of malware, and key operating systems. Additionally, learn about important investigation tools like Whois and Nslookup. This quiz is perfect for anyone looking to strengthen their knowledge in Cyber Security.

    More Like This

    Cyber Security Attacks Types
    8 questions

    Cyber Security Attacks Types

    HighSpiritedTrigonometry avatar
    HighSpiritedTrigonometry
    Malware and Cyber Security Quiz
    13 questions
    Network Security Attacks Overview
    10 questions
    Use Quizgecko on...
    Browser
    Browser