PCCET - INTRO TO CYBER SECURITY
EXAM
OSI (Open Systems Interconnection) - Correct Answers -The OSI Model describes 7
layers that computer systems use to communicate over a network.
Internet Protocol (IP) - Correct Answers -The IP is a protocol, or set of rules, for routing
and addressing packets of data so that they can travel across networks and arrive at the
correct destination.
Multiprotocol Label Switching (MPLS) - Correct Answers -MPLS is a routing technique
in networks that directs data from one node to the next based on short path labels
rather than long network addresses.
NODE TO NODE, SHORT RANGE
Broadcast Domain - Correct Answers -A broadcast domain is the portion of a network
that receives broadcast packets sent from a node in the domain.
Collision Domain - Correct Answers -A collision domain is a network segment on which
data packets may collide during transmission
URL (Uniform Resource Locator) - Correct Answers -A location or address identifying
where documents can be found on the Internet; a Web address
A URL is a reference to a web resource that specifies its location on a computer
network.
Network Nodes - Correct Answers -Networks nodes are host computers that are
identified by an IP address
Routing Hop Count - Correct Answers -The routing hop count is the total number of
routing devices a packet traverses from a source host to its final destination host.
FQDN (Fully Qualified Domain Name) - Correct Answers -the complete domain name
for a specific computer, service, or resource connected to a network.
, Hypertext Transfer Protocol (HTTP) - Correct Answers -protocol used to transfer data
between web servers and web browsers
HTTPS (Hypertext Transfer Protocol Secure) - Correct Answers -Secure version of
HTTP that uses Secure Sockets Layer SSL or Transport Layer Security TLS encryption
Web 2.0 (Enterprise 2.0) - Correct Answers -Applications (SaaS) that work along side
networks to:
1. Increase collaboration
2. Increase Knowledge sharing
3. Reduce Expenses
Web 2.0 - File Sharing Services - Correct Answers -Used to Manage, Distribute, and
provide access to online content (documents, images, music, software, video)
Examples - Dropbox, Google Drive, Youtube, etc.
Web 2.0 - Instant Messaging (IM) - Correct Answers -Used to exchange short
messages in real time.
(Facebook Messenger, Skype, Snapchat, Whatsapp)
Web 2.0 - Microblogging - Correct Answers -Used to broadcast short messages to other
subscribers
(Tumblr, Twitter)
Malware Types - Worms - Correct Answers -Targets computer networks by replicating
itself to spread rapidly. Worms do not need to infect other programs and do not need to
be executed by a user or process.
Malware Types - Virus - Correct Answers -Malware that is self-replicating but must first
infect a host program and be executed by a user or process.
Advanced Malware - Obfuscation / Obfuscating Malware - Correct Answers -the action
of making something obscure, unclear, or unintelligible
Web 2.0 - Office Productivity Suites - Correct Answers -Used for word-processing,
spreadsheets, and presentation software.
(Gsuite, Office 365)
Web 2.0 - Remote Access Software - Correct Answers -Used for remote sharing and
control of an endpoint, collaboration, or troubleshooting
(LogMeIn and TeamViewer)
Web 2.0 - Remote Team Meeting Software - Correct Answers -Used for audio
conferencing, video conferencing, screen sharing.
(Zoom, Teams)
EXAM
OSI (Open Systems Interconnection) - Correct Answers -The OSI Model describes 7
layers that computer systems use to communicate over a network.
Internet Protocol (IP) - Correct Answers -The IP is a protocol, or set of rules, for routing
and addressing packets of data so that they can travel across networks and arrive at the
correct destination.
Multiprotocol Label Switching (MPLS) - Correct Answers -MPLS is a routing technique
in networks that directs data from one node to the next based on short path labels
rather than long network addresses.
NODE TO NODE, SHORT RANGE
Broadcast Domain - Correct Answers -A broadcast domain is the portion of a network
that receives broadcast packets sent from a node in the domain.
Collision Domain - Correct Answers -A collision domain is a network segment on which
data packets may collide during transmission
URL (Uniform Resource Locator) - Correct Answers -A location or address identifying
where documents can be found on the Internet; a Web address
A URL is a reference to a web resource that specifies its location on a computer
network.
Network Nodes - Correct Answers -Networks nodes are host computers that are
identified by an IP address
Routing Hop Count - Correct Answers -The routing hop count is the total number of
routing devices a packet traverses from a source host to its final destination host.
FQDN (Fully Qualified Domain Name) - Correct Answers -the complete domain name
for a specific computer, service, or resource connected to a network.
, Hypertext Transfer Protocol (HTTP) - Correct Answers -protocol used to transfer data
between web servers and web browsers
HTTPS (Hypertext Transfer Protocol Secure) - Correct Answers -Secure version of
HTTP that uses Secure Sockets Layer SSL or Transport Layer Security TLS encryption
Web 2.0 (Enterprise 2.0) - Correct Answers -Applications (SaaS) that work along side
networks to:
1. Increase collaboration
2. Increase Knowledge sharing
3. Reduce Expenses
Web 2.0 - File Sharing Services - Correct Answers -Used to Manage, Distribute, and
provide access to online content (documents, images, music, software, video)
Examples - Dropbox, Google Drive, Youtube, etc.
Web 2.0 - Instant Messaging (IM) - Correct Answers -Used to exchange short
messages in real time.
(Facebook Messenger, Skype, Snapchat, Whatsapp)
Web 2.0 - Microblogging - Correct Answers -Used to broadcast short messages to other
subscribers
(Tumblr, Twitter)
Malware Types - Worms - Correct Answers -Targets computer networks by replicating
itself to spread rapidly. Worms do not need to infect other programs and do not need to
be executed by a user or process.
Malware Types - Virus - Correct Answers -Malware that is self-replicating but must first
infect a host program and be executed by a user or process.
Advanced Malware - Obfuscation / Obfuscating Malware - Correct Answers -the action
of making something obscure, unclear, or unintelligible
Web 2.0 - Office Productivity Suites - Correct Answers -Used for word-processing,
spreadsheets, and presentation software.
(Gsuite, Office 365)
Web 2.0 - Remote Access Software - Correct Answers -Used for remote sharing and
control of an endpoint, collaboration, or troubleshooting
(LogMeIn and TeamViewer)
Web 2.0 - Remote Team Meeting Software - Correct Answers -Used for audio
conferencing, video conferencing, screen sharing.
(Zoom, Teams)