1.3 Flashcards
BYOD device variety also causes security issues, especially in terms of unpatched devices. Another issue is that the device is not fully under the administrative control of the IT department. An insider _______________ could install apps that might risk school data or misuse the device to exfiltrate data.
threat actor
_______________ refer to the ability of a network device to transmit or receive at the same time or not. Half-duplex means only one can happen at a time, while Full-duplex means send/receive can happen simultaneously. If not configured properly, collisions can occur.
Duplex settings
_________________ is also used in most denial of service (DoS) attacks to mask the attack’s origin and make it harder for the target system to block packets from the attacking system. In this type of spoofing, the threat actor does not care about not receiving return traffic.
IP spoofing
______________ is the time that passes as the link is either up or down. You may also want to track the uptime or downtime percentage so that you can assess a link’s reliability over time.
Uptime/downtime
________________ is beneficial in cases where multiple private IP addresses are being mapped onto a single public address.
Port Address Translation (PAT)
The first step is for the client to send a segment with the TCP flag SYN set to the server with a __________________ . The client enters the SYN-SENT state.
randomly generated sequence number
An email administrator is setting up records for their new cluster of mail servers. What must each of their MX records point to?
The host identified in an ____________ record must have an associated A or AAAA record.
MX
An _______________ is when a threat actor stands up another access point (AP) that spoofs the legitimate AP. When users try to manually reconnect, the fake AP will be able to harvest users’ authentication information.
evil twin attack
An _______________ is when a threat actor stands up another access point (AP) that spoofs the legitimate AP. When users try to manually reconnect, the fake AP will be able to harvest users’ authentication information.
evil twin attack
This evil twin may also act as a ___________ if connected to legitimate local area network (LAN). This AP can then snoop on incoming connections to other servers and websites on the LAN.
rogue AP