ITS 2330 - Introduction to Network Security

Review for Mid-term

The following questions are provided to help you study for the mid-term. Do not expect to see these exact questions on the test.

  1. What is a bootloader? What are the three that are covered in chapter 1?
  2. What is a binary, like the ones you find in /bin folders?
  3. What is a good general definition of Big Data?
  4. What does splunk do for big data that other products don't do?
  5. What are some GUIs that you can load on most versions of Linux?
  6. What are the essential commands to add and remove a temporary filesystem, such as a portable hard drive?
  7. Which level of RAID does not offer and improved chance of recovery? Which one doubles the money you must invest in hard drives without increasing your usable storage?
  8. What is the ISO-OSI network model? What are its layers and the main purpose of each one?
  9. What are two other network models? How are they different from the OSI model?
  10. What are two Linux commands that can tell you what your IP address is?
  11. How do you use the route command to find the IP address of your default gateway?
  12. What are the key differences between CentOS and Ubuntu?
  13. What is an IDS, and how can they aid in the discovery of security incidents?
  14. What are some useful filters/commands that can be used in Wireshark?
  15. What is Ettercap and how can it be used?
  16. What are some crucial logs to monitor for strange activity?
  17. Why use CentOS over other Linux distributions?
  18. Why can't you use apt-get to install splunk?
  19. What are the four standard backup schemes?
  20. What is the file system that allows you to make changes to Linux while the kernel is running?
  21. What are the proper steps to install CentOS?
  22. Best ways to stop a social engineering scheme?
  23. How to find faults in a systems security?
  24. What are the proper steps to install CentOS?
  25. Best ways to stop a social engineering scheme?
  26. How to find faults in a system's security?
  27. What can be done to secure CentOS?
  28. What can be done to help defend against MITM attacks?
  29. What is a LAMP stack?
  30. How can Splunk be used to help businesses?
  31. What are some tools you can use to sniff a network?
  32. How do you redirect the output of a file to another file?
  33. Network Services.  What is and how to configure a static IP address
  34. Four main functions of the kernel
  35. How to have a filesystem automatically attached at boot
  36. Examine the list in chapter 1 of reasons why it is difficult to defend against attacks. Explain three of them.