|
|
ITS 2330 - Introduction to Network Security
Review for Mid-term
The following questions are provided to help you study for the
mid-term. Do not expect to see these exact questions on the
test.
- What is a bootloader? What are the three that are covered in
chapter 1?
- What is a binary, like the ones you find in /bin folders?
- What is a good general definition of Big Data?
- What does splunk do for big data that other products don't do?
- What are some GUIs that you can load on most versions of
Linux?
- What are the essential commands to add and remove a temporary
filesystem, such as a portable hard drive?
- Which level of RAID does not offer and improved chance of
recovery? Which one doubles the money you must invest in hard
drives without increasing your usable storage?
- What is the ISO-OSI network model? What are its layers and the
main purpose of each one?
- What are two other network models? How are they different from
the OSI model?
- What are two Linux commands that can tell you what your IP
address is?
- How do you use the route command to find the IP address of
your default gateway?
- What are the key differences between CentOS and Ubuntu?
- What is an IDS, and how can they aid in the discovery of
security incidents?
- What are some useful filters/commands that can be used in
Wireshark?
- What is Ettercap and how can it be used?
- What are some crucial logs to monitor for strange activity?
- Why use CentOS over other Linux distributions?
- Why can't you use apt-get to install splunk?
- What are the four standard backup schemes?
- What is the file system that allows you to make changes to
Linux while the kernel is running?
- What are the proper steps to install CentOS?
- Best ways to stop a social engineering scheme?
- How to find faults in a systems security?
- What are the proper steps to install CentOS?
- Best ways to stop a social engineering scheme?
- How to find faults in a system's security?
- What can be done to secure CentOS?
- What can be done to help defend against MITM attacks?
- What is a LAMP stack?
- How can Splunk be used to help businesses?
- What are some tools you can use to sniff a network?
- How do you redirect the output of a file to another file?
- Network Services. What is and how to configure a static
IP address
- Four main functions of the kernel
- How to have a filesystem automatically attached at boot
- Examine the list in chapter 1 of reasons why it is difficult
to defend against attacks. Explain three of them.
|