Chapter 3:Understanding Devices and Infrastructure Flashcards

1
Q

TCP/IP Layers

A

4) Application
3) Transport
2) Internet
1) Network Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Antiquated Protocols

A

Protocols once needed but now serve no purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPv4 address length

A

32-bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IPv6 address length

A

128-bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Command to show active ports

A

netstat -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Windows Socket (Winsock) API

A

A Microsoft API used to interact with TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet Small Computer Systems Interface (iSCSI)

A

A protocol that enables the creation of storage area networks (SANs) and is used in sending storage-related commands over IP networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fibre Channel

A

A high-speed networking technology designed to work like iSCSI but for fiber only. Cannot work across large networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Security Benefit of VLANs

A

Allow users with similar data sensitivity levels to be segmented together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security Benefit of Tunneling

A

Sensitive data can be encapsulated into other packets and sent directly from one network to its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Point-to-Point Tunneling Protocol (PPTP)

A
  • Encapsulates and encrypts PPP packets

- Weakness is that the negotiation between the two points in done in the clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layer 2 Forwarding (L2F)

A
  • Tunneling protocol used primarily for dial-up

- No encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 2 Tunneling Protocol (L2TP)

A
  • Hybrid of PPTP and L2F

- Not encrypted by default, but can use IPSec for security needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Secure Shell (SSH)

A

-Uses encryption to establish a secure connection between two systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPSec

A

A set of protocols that enable encryption, authentication, and integrity over IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPSec Transport vs. Tunneling Mode

A

Transport encrypts only the payload whereas tunneling also encrypts everything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RAS

A

Remote Access Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The Private IP Addresses

A
  1. 0.0.0-10.255.255.255
  2. 16.0.0-172.31.255.255
  3. 168.0.0-192.168.255.255
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Telephony

A

Telephone technology combined with information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Biggest Security Problem with VoIP

A

If VoIP and data are on the same line then they are both vulnerable to a private branch exchange (PBX) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Appliances

A

Freestanding devices that operate in a largely self-contained manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Packet Filter

A
  • Passes or blocks traffic to specific addresses based on the type of application.
  • Decides based on addressing info, not actual content
23
Q

Proxy Firewall

A
  • Examines data and makes rule-based decisions about whether the data should pass through
  • Hides IP addresses
24
Q

Dual-Homed Firewall

A

A firewall using two NICs, one connected to the outside network and one connecting to the internal network

25
Q

Multihomed

A

More than one IP address

26
Q

Application-Level Proxy

A

Reads the individual commands of the protocols that are being served.

27
Q

Circuit-Level Proxy

A

Creates a circuit between the client and the server and doesn’t deal with the contents of the packets.

28
Q

Stateless Firewalls

A

Make decisions based on the data that comes in and not based on any complex decisions

29
Q

Stateful Packet Inspection (SPI)

A

Remembers where the packet came from and where the next one should come from.

30
Q

Border Router

A

A router used to translate from LAN framing to WAN framing.

31
Q

Web Security Gateway

A

A proxy server with web protection software built in

32
Q

Activity (IDS)

A

An element of a data source that is of interest to the IDS.

33
Q

Administrator (IDS)

A

The person responsible for setting the security policy, and for making decisions about the IDS.

34
Q

Data Source (IDS)

A

The raw info that the IDS uses to detect suspicious activity.
Audit files, system logs, etc.

35
Q

Manager (IDS)

A

The component that the operator uses to manage the IDS.

36
Q

Sensor (IDS)

A

The IDS component that collects data from the data source and passes it to the analyzer

37
Q

Behavior-Based IDS

A

Looks for variations in behavior such as unusually high traffic, policy violations, etc.

38
Q

Signature-Based IDS

A

Focused on evaluating attacks based on attack signatures and audit trails.

39
Q

Misuse-Detection IDS (MD-IDS)

A

Another name for signature-based IDS

40
Q

Attack Signature

A

A generally established method of attacking a system

41
Q

Anomaly-Detection IDS (AD-IDS)

A

Looks for things outside of the ordinary

behavior based falls under this category

42
Q

Heuristic IDS

A

Uses algorithms to analyze the traffic passing through the network

43
Q

Passive Responses

A

Logging, Notification, and Shunning

44
Q

Shunning

A

Ignoring an attack because you know it will not be able to hurt you

45
Q

Active Response

A

Takes action based on an attack or threat

46
Q

Deception Active Response

A

Fools the attacker into thinking they are succeeding, while actually redirecting it to a honeypot and monitoring it

47
Q

/var/log/faillog

A

List of users’ failed authentication attempts

48
Q

/var/log/lastlog

A

List of users and when they last logged in

49
Q

/var/log/messages

A

Could contain login-related entries

50
Q

/var/log/wtmp

A

List of users who have authenticated

51
Q

All-in-one-Appliance

A
  • Appliances that provide a good foundation of security including URL filtering, content inspection, or malware inspection.
  • Also known as Unified Threat Management (UTM) and Next Generation Firewall (NGFW)
52
Q

Web Application Firewall (WAF)

A
  • A real-time appliance that applies a set of rules to block traffic to and from web servers and to try to prevent attacks.
  • Specific to web-based servers.
53
Q

Application -Aware Device

A

One that has the ability to respond to traffic based on what is there.

54
Q

PPP

A
  • Widely used for dial-up connections

- Should not be used for a WAN VPN connection