with Complete Solutions
Web 3.0 - AI and Machine Learning - Answer-2 Related technologies that enables
systems to understand and interact much in the same way that a human might use
information.
Web 3.0 - Blockchain - Answer-Data Structure containing transactional records (stored
as blocks) that ensures security and transparency through a vast, decentralized peer to
peer network with no single controlling authority.
(Bitcoin)
Web 3.0 - Data Mining - Answer-Enables patterns to be discovered in large datasets by
using ML, Statistical analysis, and database tech.
Web 3.0 - Mixed Reality - Answer-VR, Augmented Reality, and Extended Reality, to
deliver physical/digital sensory experience.
(VR Chat)
Web 3.0 - Natural Language Search - Answer-Ability to understand human spoken
language and context to find info
Managed Security Services Providers (MSSPs) - Answer-Providers that offer fully
staffed, 24/7 Security Operations Services (SOC), log collection and aggregation
services in a SIEM (Security Information and Event Management) Platform, event
detection alerting, vulnerability scanning and patch management, threat intelligence,
and incident response and forensic investigation, among others.
MSSPs - Security Operations Services (SOC) - Answer-SOCs monitor, prevent, detect,
investigate, and respond to cyber threats 24/7.
1. Prevention and Detection - Detect malicious activity and prevent it before it can cause
damage
2. Investigation - Review networks from the attacker's perspective, looking for key
indicators and areas of exposure before they are exploited.
3. Response - Perform actions like isolating endpoints, terminating harmful processes,
and preventing them from further actions like deleting files.
https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-
soc/#:~:text=The%20function%20of%20the%20security,cyber%20threats%20around%2
0the%20clock.
, MSSPs - Security Information and Event Management (SIEM) - Answer-SIEM tools
(software solutions) aggregate data from multiple systems and analyze that data to
catch abnormal behavior or potential cyber-attacks.
Provide 2 primary capabilities -
1. Reporting and Forensics about security incidents
2. Alerts based on analytics that match rules created to indicate security
issues/vulnerabilities
OSI (Open Systems Interconnection) - Answer-The OSI Model describes 7 layers that
computer systems use to communicate over a network.
Internet Protocol (IP) - Answer-The IP is a protocol, or set of rules, for routing and
addressing packets of data so that they can travel across networks and arrive at the
correct destination.
Multiprotocol Label Switching (MPLS) - Answer-MPLS is a routing technique in
networks that directs data from one node to the next based on short path labels rather
than long network addresses.
NODE TO NODE, SHORT RANGE
Broadcast Domain - Answer-A broadcast domain is the portion of a network that
receives broadcast packets sent from a node in the domain.
Collision Domain - Answer-A collision domain is a network segment on which data
packets may collide during transmission
URL (Uniform Resource Locator) - Answer-A location or address identifying where
documents can be found on the Internet; a Web address
A URL is a reference to a web resource that specifies its location on a computer
network.
Network Nodes - Answer-Networks nodes are host computers that are identified by an
IP address
Routing Hop Count - Answer-The routing hop count is the total number of routing
devices a packet traverses from a source host to its final destination host.
FQDN (Fully Qualified Domain Name) - Answer-the complete domain name for a
specific computer, service, or resource connected to a network.
Hypertext Transfer Protocol (HTTP) - Answer-protocol used to transfer data between
web servers and web browsers