Background Flashcards

1
Q

What is shrinkwrap code?

A

Reused code that still contains vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IEEE standard describes authentication?

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does an ICMP Type 3/Code 6 error message indicate?

A

Destination unreachable, because the router has no route to the network on which the destination resides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a client use to encrypt the session key in an SSL connection?

A

Server’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which common web transport protocol can be used to evade an IDS and tunnel malicious content?

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the broadcast address in the 172.17.0.0/16 network?

A

172.17.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Layer 2 Ethernet broadcast address?

A

0xffffffffffff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which web site can be used to determine the owner of a target web site?

A

whois.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which IP address does a computer use to refer to itself?

A

127.0.0.1 or the loopback address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does an ICMP Type 3/Code 4 error message indicate?

A

Destination unreachable, because the packet requires fragmentation, but the don’t fragment bit is set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a rootkit?

A

Low-level software that hides backdoor processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the darknet?

A

Network, software or service available outside of normal internet traffic and search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which IEEE standard describes VLAN encapsulation?

A

802.1q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

At which layer of the OSI model does a cross-site scripting attack occur?

A

Application layer (Layer 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of firewall monitors the TCP handshake between packets to determine whether a requested session is legitimate?

A

Circuit level gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

At which layer of the OSI model do proxy servers operate?

A

Application (Layer 7)

17
Q

Which type of NAT uses a one-to-one mapping model?

A

Static NAT

18
Q

Which IEEE standard describes Ethernet?

19
Q

What does an ICMP Type 3/Code 13 error message indicate?

A

Destination unreachable, because it is administratively prohibited (router is blocking ICMP)

20
Q

Which key is required to decrypt a message encrypted by a client’s public key?

A

Client’s private key

21
Q

What is shellshock?

A

A vulnerability exposed in the Unix Bash shell allowing attackers to execute arbitrary commands

22
Q

Which type of NAT uses a one-to-many mapping model?

A

Port Address Translation (PAT)

23
Q

What is called when traffic between point A and point B takes one route to get there and another to return?

A

Asymmetric routing

24
Q

Which IEEE standard describes Wireless Fidelity (WiFi)?

25
Which IEEE standard describes Logical Link Control (LLC)?
802.2
26
At which layer of the OSI model does an ARP poisoning attack occur?
Data Link layer (Layer 2)
27
At which layer of the OSI model does an IP spoofing attack occur?
Network (Layer 3)
28
At which layer of the OSI model does an attack using a rogue DHCP server occur?
Network (Layer 3)
29
At which layer of the OSI model do packet filtering firewalls operate?
Network (Layer 3)
30
Which tunneling protocol operates at the Data Link layer and uses Microsoft Point-to-Point Encryption (MPPE) to protect the connection?
Point-to-Point Tunneling Protocol (PPTP)
31
Which type of NAT uses a many-to-many mapping model?
Dynamic NAT
32
192.168.5.1/24 an example of which kind of reserved IP address?
A network ID
33
192.168.6.255/24 an example of which kind of reserved IP address?
A broadcast address
34
Which protocol maps IP addresses to MAC addresses?
Address Resolution Protocol (ARP)
35
Which key is required to decrypt a message that was encrypted with a server's private key?
Server's public key
36
What is heartbleed?
A vulnerability exposed in the OpenSSL cryptographic library allowing attackers to steal server private keys and user session cookies and passwords.