Background Flashcards
What is shrinkwrap code?
Reused code that still contains vulnerabilities
Which IEEE standard describes authentication?
802.1x
What does an ICMP Type 3/Code 6 error message indicate?
Destination unreachable, because the router has no route to the network on which the destination resides
What does a client use to encrypt the session key in an SSL connection?
Server’s public key
Which common web transport protocol can be used to evade an IDS and tunnel malicious content?
SSL
What is the broadcast address in the 172.17.0.0/16 network?
172.17.255.255
What is the Layer 2 Ethernet broadcast address?
0xffffffffffff
Which web site can be used to determine the owner of a target web site?
whois.com
Which IP address does a computer use to refer to itself?
127.0.0.1 or the loopback address
What does an ICMP Type 3/Code 4 error message indicate?
Destination unreachable, because the packet requires fragmentation, but the don’t fragment bit is set
What is a rootkit?
Low-level software that hides backdoor processes
What is the darknet?
Network, software or service available outside of normal internet traffic and search engines
Which IEEE standard describes VLAN encapsulation?
802.1q
At which layer of the OSI model does a cross-site scripting attack occur?
Application layer (Layer 7)
What type of firewall monitors the TCP handshake between packets to determine whether a requested session is legitimate?
Circuit level gateway