What are the Cyber Security principals and what do they stand for? - Correct Answer-
CIA - Confidentiality, Integrity, Availability
What is one of the most important parts of defending and attacking in cybersecurity? - Correct Answer-Research
Software designed for malicious purposes, or malicious software. It can be hidden in a computer program, a piece of code, and even embedded in hardware. - Correct Answer-Malware
Self-replicating software that targets systems in a computer and attaches itself to them upon execution. As a virus spreads across a computer, it may corrupt or destroy data and cause a lot of damage - Correct Answer-Virus
Similar to a virus, a worm self-replicates, but does not require user intervention for it to be executed. It can spread to other computers, typically over a network - Correct Answer-Worm
Code that masquerades as a legitimate program but causes a lot of damage when executed. Trojan horses do not self-replicate like worms or viruses. They can, however, create backdoors in systems, or use system resources for various purposes, such as crypto mining - Correct Answer-Trojan Horse
Malware that attempts to harvest information from a computer. The possibly confidential
information is copied to the attacker's computer - Correct Answer-Spyware
Malware that encrypts computer files and prevents them from being accessed or restored. Widely used for financial purposes, including demands for payment in return for decrypting the files - Correct Answer-Ransomware
What does ACL stand for? - Correct Answer-Access Control List
What does NAT stand for? - Correct Answer-Network Address Translation
What does WAN stand for? - Correct Answer-Wide Area Network
What does NIC stand for? - Correct Answer-Network Interface Card
What does LAN stand for? - Correct Answer-Local Area Network Pieces of information (data) sent across a network. - Correct Answer-Packets
Two or more computers connected and grouped together in a specific framework - Correct Answer-Networks
Powerful computers designed to provide services to other computers, such as web services, storage services, and email services. - Correct Answer-Servers
Machines that can perform calculations, accomplish complicated operations, and execute programs based on a sequence of commands and inserted input - Correct Answer-Computers
Devices or software that use different services provided by servers. They establish communication with a server and request its services. Clients can also refer to software,
such as browsers. The browser is a client that uses the services provided by HTTP servers. - Correct Answer-Clients
Devices connected to a network, such as computers, servers, phones, and IoT devices. - Correct Answer-Endpoint Devices
A network device designed to forward packets based on their MAC addresses within a network. - Correct Answer-Switch
A network device designed to forward packets based on their IP addresses between networks. - Correct Answer-Router
Predefined sets of rules describing how something should work or behave. They help maintain order among different technologies. - Correct Answer-Protocols
Is a distributed application structure that manages tasks and workloads. Workloads are shared among resource and service providers (servers), and responses are delivered to
clients who request those services. - Correct Answer-Client-Server Communication
What type of protocol is 192.168.0.0 - Correct Answer-IPv4
What type of protocol is 2001:0db8:0000:0042:0000:8a2e:0370:7334 - Correct Answer-
IPv6
The smallest data unit a computer uses - Correct Answer-Bit
What is a hypervisor? - Correct Answer-software that creates and manages a virtual machine on a host machine
What type of ware is hypervisor type 1 - Correct Answer-Hardware
What type of ware is hypervisor type 2 - Correct Answer-Software