4.3 Network Hardening Techniques Flashcards

1
Q

SNMP is used for?

A

a protocol used to manage network devices (mostly to query devices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the secured version of SNMP?

A

SNMP v1 and SNMP v2 = unencrypted
SNMP v3 is the encrypted version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Footprinting allows a threat actor to discover the:

A

topology and general
configuration of the network and security systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Footprinting can be done by:

A

social engineering attacks—persuading users to give information or locating information that has been thrown out as trash, for instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port scanning specifically aims to enumerate the:

A

TCP or UDP application ports on which a host
will accept connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fingerprinting allow: s a threat actor to identify device and:

A

OS types and versions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spoofing Attacks

Descrbie what is spoofing?

A

attacker disguises his or her identity

The term spoofing covers a wide range of different attacks. Spoofing can include any type of attack where the attacker disguises his or her identity, or in which the source of network information is forged to appear legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spoofing Attacks

Which protocols are commonly exploited in spoofing attacks?

a) TCP and UDP
b) HTTP and HTTPS
c) ARP and DNS
d) FTP and SSH

A

c) ARP and DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How DNS poisoning works?

A

Attacker change the IP address of a DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly