Chapter 11: Secure Network Architecture and Components Flashcards

1
Q

Telnet Port

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FTP Port

A

20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TFTP Port

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SMTP Port

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

POP3

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IMAP4 Port

A

143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DCHP

A

67 (server); 68 (client)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTP Port

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTPS Port

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LPD Port

A

515

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NFS Port

A

2049

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SNMP

A

161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS Port

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The primary function of ______ is to provide mutual certificate authentication and encrypted sessions between devices during DNS operations.

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______ is the act of falsifying the DNS information used by a client to reach a desired system.

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _____ can listen in on network traffic for any DNS query or specific DNS queries related to a target site.

A

rogue DNS server

17
Q

A _____attempts to provide false responses to DNS queries from malware, such as bots, to prevent access to command and control systems.

A

DNS sinkhole

18
Q

_____ is the malicious action of changing the registration of a domain name without the authorization of the valid owner.

A

Domain hijacking

19
Q

____ is a practice employed to take advantage of when a user mistypes the domain name or IP address of an intended resource.

A

Typosquatting

20
Q

These attacks leverage similarities in character sets to register phony international domain names (IDNs) that to the naked eye appear legitimate

A

homograph attack

21
Q

______ is used to resolve IP addresses (32-bit binary number for logical addressing) into MAC addresses

A

Address Resolution Protocol (ARP)

22
Q

A ______is a formal assessment of wireless signal strength, quality, and interference using an RF signal detector.

A

site survey

23
Q

A _____ is a mapping of signal strength measurements over a building’s blueprint.

24
Q

A _____ portal is an authentication technique that redirects a newly connected client to a web-based portal access control page. The portal page may require the user to input payment information, provide logon credentials, or input an access code.

25
_____ is a DoS attack against a Bluetooth device that can be accomplished through transmission of garbage traffic or signal jamming.
Bluesmacking
26
_____ is Bluetooth-focused network packet capturing.
Bluesniffing
27
______ involves sending unsolicited messages to Bluetooth-capable devices without the permission of the owner/user. These messages may appear on a device's screen automatically, but many modern devices prompt whether to display or discard such messages.
Bluejacking
28
______ is the unauthorized access of data via a Bluetooth connection.
Bluesnarfing
29
______ grants an attacker remote control over the hardware and software of your devices over a Bluetooth connection.
Bluebugging
30
_____ is someone using a detection tool to look for wireless networking signals, often ones they aren't authorized to access.
War driving
31
_____ is an attack in which a hacker operates a false access point that will automatically clone, or twin, the identity of an access point based on a client device's request to connect.
Evil twin
32
_____ attacks attempt to reestablish a communication session by replaying (i.e., retransmitting) captured traffic against a system.
Replay
33
_______ wireless is widely used by SCADA systems to communicate over a distance or geographic space where cables or traditional wireless are ineffective or inappropriate.
Narrow-band
34
_____ is an IoT equipment communications concept that is based on Bluetooth.
Zigbee
35
A ______ network, is a collection of resource services deployed in numerous data centers across the internet in order to provide low latency, high performance, and high availability of the hosted content.
content distribution network (CDN), or content delivery