Background Flashcards

1
Q

What is shrinkwrap code?

A

Reused code that still contains vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IEEE standard describes authentication?

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does an ICMP Type 3/Code 6 error message indicate?

A

Destination unreachable, because the router has no route to the network on which the destination resides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a client use to encrypt the session key in an SSL connection?

A

Server’s public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which common web transport protocol can be used to evade an IDS and tunnel malicious content?

A

SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the broadcast address in the 172.17.0.0/16 network?

A

172.17.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Layer 2 Ethernet broadcast address?

A

0xffffffffffff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which web site can be used to determine the owner of a target web site?

A

whois.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which IP address does a computer use to refer to itself?

A

127.0.0.1 or the loopback address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does an ICMP Type 3/Code 4 error message indicate?

A

Destination unreachable, because the packet requires fragmentation, but the don’t fragment bit is set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a rootkit?

A

Low-level software that hides backdoor processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the darknet?

A

Network, software or service available outside of normal internet traffic and search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which IEEE standard describes VLAN encapsulation?

A

802.1q

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

At which layer of the OSI model does a cross-site scripting attack occur?

A

Application layer (Layer 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of firewall monitors the TCP handshake between packets to determine whether a requested session is legitimate?

A

Circuit level gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

At which layer of the OSI model do proxy servers operate?

A

Application (Layer 7)

17
Q

Which type of NAT uses a one-to-one mapping model?

A

Static NAT

18
Q

Which IEEE standard describes Ethernet?

A

802.2

19
Q

What does an ICMP Type 3/Code 13 error message indicate?

A

Destination unreachable, because it is administratively prohibited (router is blocking ICMP)

20
Q

Which key is required to decrypt a message encrypted by a client’s public key?

A

Client’s private key

21
Q

What is shellshock?

A

A vulnerability exposed in the Unix Bash shell allowing attackers to execute arbitrary commands

22
Q

Which type of NAT uses a one-to-many mapping model?

A

Port Address Translation (PAT)

23
Q

What is called when traffic between point A and point B takes one route to get there and another to return?

A

Asymmetric routing

24
Q

Which IEEE standard describes Wireless Fidelity (WiFi)?

A

802.11

25
Q

Which IEEE standard describes Logical Link Control (LLC)?

A

802.2

26
Q

At which layer of the OSI model does an ARP poisoning attack occur?

A

Data Link layer (Layer 2)

27
Q

At which layer of the OSI model does an IP spoofing attack occur?

A

Network (Layer 3)

28
Q

At which layer of the OSI model does an attack using a rogue DHCP server occur?

A

Network (Layer 3)

29
Q

At which layer of the OSI model do packet filtering firewalls operate?

A

Network (Layer 3)

30
Q

Which tunneling protocol operates at the Data Link layer and uses Microsoft Point-to-Point Encryption (MPPE) to protect the connection?

A

Point-to-Point Tunneling Protocol (PPTP)

31
Q

Which type of NAT uses a many-to-many mapping model?

A

Dynamic NAT

32
Q

192.168.5.1/24 an example of which kind of reserved IP address?

A

A network ID

33
Q

192.168.6.255/24 an example of which kind of reserved IP address?

A

A broadcast address

34
Q

Which protocol maps IP addresses to MAC addresses?

A

Address Resolution Protocol (ARP)

35
Q

Which key is required to decrypt a message that was encrypted with a server’s private key?

A

Server’s public key

36
Q

What is heartbleed?

A

A vulnerability exposed in the OpenSSL cryptographic library allowing attackers to steal server private keys and user session cookies and passwords.