Background Flashcards
What is shrinkwrap code?
Reused code that still contains vulnerabilities
Which IEEE standard describes authentication?
802.1x
What does an ICMP Type 3/Code 6 error message indicate?
Destination unreachable, because the router has no route to the network on which the destination resides
What does a client use to encrypt the session key in an SSL connection?
Server’s public key
Which common web transport protocol can be used to evade an IDS and tunnel malicious content?
SSL
What is the broadcast address in the 172.17.0.0/16 network?
172.17.255.255
What is the Layer 2 Ethernet broadcast address?
0xffffffffffff
Which web site can be used to determine the owner of a target web site?
whois.com
Which IP address does a computer use to refer to itself?
127.0.0.1 or the loopback address
What does an ICMP Type 3/Code 4 error message indicate?
Destination unreachable, because the packet requires fragmentation, but the don’t fragment bit is set
What is a rootkit?
Low-level software that hides backdoor processes
What is the darknet?
Network, software or service available outside of normal internet traffic and search engines
Which IEEE standard describes VLAN encapsulation?
802.1q
At which layer of the OSI model does a cross-site scripting attack occur?
Application layer (Layer 7)
What type of firewall monitors the TCP handshake between packets to determine whether a requested session is legitimate?
Circuit level gateway
At which layer of the OSI model do proxy servers operate?
Application (Layer 7)
Which type of NAT uses a one-to-one mapping model?
Static NAT
Which IEEE standard describes Ethernet?
802.2
What does an ICMP Type 3/Code 13 error message indicate?
Destination unreachable, because it is administratively prohibited (router is blocking ICMP)
Which key is required to decrypt a message encrypted by a client’s public key?
Client’s private key
What is shellshock?
A vulnerability exposed in the Unix Bash shell allowing attackers to execute arbitrary commands
Which type of NAT uses a one-to-many mapping model?
Port Address Translation (PAT)
What is called when traffic between point A and point B takes one route to get there and another to return?
Asymmetric routing
Which IEEE standard describes Wireless Fidelity (WiFi)?
802.11