6B: Evaluate Network Traffic Flashcards

2.2 Given a scenario, perform active reconnaissance. 2.3 Given a scenario, analyze the results of a reconnaissance exercise. 3.7 Given a scenario, perform post-exploitation techniques. 5.3 Explain use cases of the following tools during the phases of a penetration test.

1
Q

A protocol which provides a framework for name resolution, registration, and conflict detection on a LAN.

A

NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any location, such as a system or network in an organization, that stores, transmits, or processes cardholder data.

A

Cardholder Data Environment (CDE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Broadcast mechanism by which the hardware MAC address of an interface is matched to an IP address on a local network segment.

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network-based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.

A

ARP Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly