INTRODUCTION
Malware and its Types
CIA Triad
TYPES OF ATTACKS
Social Engineering
Types of Social Engineering Attacks
Why does Social Engineering works?
Denial of Service
Man In The Middle
Buffer Overflow
Injection attacks
Cross Site Scripting
ARP Poisoning
DNS Poisoning
Privilege Escalation
Amplification Attack
Man In The Browser Attack
Zero Day Attack
Replay Attack
Pass the Hash
Hijacking Attacks
Shimming and Refactoring
MAC and IP spoofing
Wireless Attacks
Cryptographic Attacks Types
Cryptographic Attacks Details
Birthday
Known plain textcipher text
Rainbow tables
Dictionary
Brute force
Collision
downgrade
Replay
Weak Implementations
Threat actor and their types
Penetration Testing
Penetration Testing vs Vulnerability Scanning
Vulnerability Scanning
Vulnerabilities Types & Impacts
Firewall & its Types
VPN Virtual Private Network
NIPS - Network Intrusion Prevention System | NIDS - Network Intrusion Detection System
Router
Switch
Proxy & its Types
Load balancer
Access Point
SIEM Security Information and Event Management
DLP Data Loss Prevention
NAC Network Access Control
Mail Gateway
Advanced Network Technologies Bridge, SSLTLS Accelerators, Decryptors, Media Gateway, HSM
Protocol Analyzer
Network Scanners
Wireless Scanners
Password Crackers
Vulnerability Scanner
Configuration compliance scanner
Exploitation frameworks
Data sanitization tools
Steganography Tools
Honeypot
Backup Utilities
Banner Grabbing
Passive Vs Active
Command Line Tools Ping
Command Line Tools Netstat
Command Line Tools Tracert
Command Line Tools Nslookup & Dig
Command Line Tools Arp
Command Line Tools Ipconfig ip ifconfig
Command Line Tools Tcpdump
Command Line Tools Nmap
Command Line Tools Netcat
Resloving Unencrypted Credentials Clear Text
Resolving Logs And Events Anomalies
Resolving Permission Issues
Resolving Access Violations
Resolving Certificate Issues
Resolving Data Exfiltration
Resolving Misconfigured Devices Firewall, Content Filter, Access Points
Resolving Weak Security Configurations
Resolving Personnel Issues Policy Violation Insider Threat Social Engineering Social Media Personal Email
Resolving Unauthorized Software
Resolving Baseline Deviationv
Resolving License Compliance Violation Availability Integrity
Resolving Asset Management
Resolving Authentication Issues
Analyzing And Interpreting Hids Hips
Analyzing And Interpreting Antivirus
Analyzing And Interpreting File Integrity Check
Analyzing And Interpreting Hostbased Firewall
Analyzing And Interpreting Application Whitelisting
Analyzing And Interpreting Removable Media Control
Analyzing And Interpreting Advanced Malware Tools
Analyzing And Interpreting Patch Management Tools
Analyzing And Interpreting UTM
Analyzing And Interpreting DLP
Analyzing And Interpreting Data Execution Prevention
Analyzing And Interpreting Web Application Firewall
Cellular Connections
WiFi
Satcom
Bluetooth
NFC
ANT
Infrared
USB
Mobile Device Management Concepts
Application Management
Content Management
Remote Wipe
Geofencing Geolocation And Gps Tagging
Asset Tracking And Inventory Control
Screen Locks
Push Notification Services
Passwords And Pins
Biometrics
Context Aware Authentication
Containerization
Storage Segmentation
Full Device Encryption
SHREE LEARNING ACADEMY
Toggle Menu
Home
Tutorial
Quiz
What Is A Router Quiz
What is the role of a router in a network?
A) To act as a storage device
B) To direct network traffic and connect different network segments
C) To create data
D) To supply electricity to devices
What is the purpose of routing tables inside a router?
A) To store passwords
B) To act as a firewall
C) To guide the direction of data packets
D) To make coffee
What is the difference between static and dynamic routing?
A) Static uses electricity, Dynamic doesn't
B) Static has fixed paths, Dynamic adapts in real-time
C) Static is for text messages, Dynamic is for videos
D) Static is faster, Dynamic is slower
What principle do ACLs generally follow for network access?
A) Allow by default, deny by exception
B) Deny by default, allow by exception
C) No rules, free for all
D) Always allow, never deny
What is the purpose of antispoofing rules or ACLs?
A) To improve router speed
B) To check source addresses and discard falsified communications
C) To allow all incoming traffic
D) To store data more efficiently
Submit answers
Your Score:
Go To Website's Tutorial Page
Read Tutorial
Watch our Video Tutorial