Exam 1 2021

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Name:

1. Please Identify the brand/vendor of this MAC address 50-EB-71-E7-57-A7

50-EB-71 - ???? not sure sa vendor, pero first 6 digits for manufacturer.

2. What is the difference between threat, vulnerabilities and risk.

Threat – gaining knowledge on one’s vulnerability to exploit the system?

Vulnerability - weakness of a software, can be resolve by patching or upgrading

Risk – potential lost on something due to potential threats

3. How does an entry in the hosts file 107.83.23.10 www.yahoo.com works

When the user accesses www.yahoo.com it will direct him to 107.83.23.10, which is not a legitimate IP
for yahoo. It can lure the user to a compromised website if not remove from the host file.

4. Please list at least 3 HTTP status code

200 OK
404 HTTP/Domain not found
500 Internal Server Error

5. Highlight all Public IP addresses.


192.168.31.1 172.32.10.7
10.236.10.108 192.169.63.23
204.33.106.2 255.255.255.254
113.176.45.64 76.45.178.36
192.168.37.1 10.0.0.0/8

6. If the user/client was not given by the DHCP server an IP, what is the default IP of the user/client?
169.254.x.x/24

7. Do we block torrent traffic? Why?

It depends. :D We can inform the customer that there is a torrent activity and advise them that it is
not recommended to use p2p connection.

8. What is the difference between DoS and DDoS?

DOS – Single targeted attack


DDOS – uses botnets or bot army, multiple attackers targeting a single host.

9. Standard port of RDP.


NA

10. Give at least 2 methods to secure RDP.

- Do not allow RDP connection on sensitive devices/servers


- Use Two Way Factor Authentication? :D

Identify if the statement promotes Confidentiality, Integrity, or Availability.

1. Use of Morse code. Confidentiality


2. File Hashes. Integrity
3. Data Back up and archiving. Availability
4. RSA. Confidentiality
5. Planting Veggies. Availability

You might also like