Chapter 11: Secure Network Architecture and Components Flashcards
Telnet Port
23
FTP Port
20 and 21
TFTP Port
69
SMTP Port
25
POP3
110
IMAP4 Port
143
DCHP
67 (server); 68 (client)
HTTP Port
80
HTTPS Port
443
LPD Port
515
NFS Port
2049
SNMP
161
DNS Port
53
The primary function of ______ is to provide mutual certificate authentication and encrypted sessions between devices during DNS operations.
DNSSEC
______ is the act of falsifying the DNS information used by a client to reach a desired system.
DNS poisoning
A _____ can listen in on network traffic for any DNS query or specific DNS queries related to a target site.
rogue DNS server
A _____attempts to provide false responses to DNS queries from malware, such as bots, to prevent access to command and control systems.
DNS sinkhole
_____ is the malicious action of changing the registration of a domain name without the authorization of the valid owner.
Domain hijacking
____ is a practice employed to take advantage of when a user mistypes the domain name or IP address of an intended resource.
Typosquatting
These attacks leverage similarities in character sets to register phony international domain names (IDNs) that to the naked eye appear legitimate
homograph attack
______ is used to resolve IP addresses (32-bit binary number for logical addressing) into MAC addresses
Address Resolution Protocol (ARP)
A ______is a formal assessment of wireless signal strength, quality, and interference using an RF signal detector.
site survey
A _____ is a mapping of signal strength measurements over a building’s blueprint.
heat map
A _____ portal is an authentication technique that redirects a newly connected client to a web-based portal access control page. The portal page may require the user to input payment information, provide logon credentials, or input an access code.
captive
_____ is a DoS attack against a Bluetooth device that can be accomplished through transmission of garbage traffic or signal jamming.
Bluesmacking
_____ is Bluetooth-focused network packet capturing.
Bluesniffing
______ involves sending unsolicited messages to Bluetooth-capable devices without the permission of the owner/user. These messages may appear on a device’s screen automatically, but many modern devices prompt whether to display or discard such messages.
Bluejacking
______ is the unauthorized access of data via a Bluetooth connection.
Bluesnarfing
______ grants an attacker remote control over the hardware and software of your devices over a Bluetooth connection.
Bluebugging
_____ is someone using a detection tool to look for wireless networking signals, often ones they aren’t authorized to access.
War driving
_____ is an attack in which a hacker operates a false access point that will automatically clone, or twin, the identity of an access point based on a client device’s request to connect.
Evil twin
_____ attacks attempt to reestablish a communication session by replaying (i.e., retransmitting) captured traffic against a system.
Replay
_______ wireless is widely used by SCADA systems to communicate over a distance or geographic space where cables or traditional wireless are ineffective or inappropriate.
Narrow-band
_____ is an IoT equipment communications concept that is based on Bluetooth.
Zigbee
A ______ network, is a collection of resource services deployed in numerous data centers across the internet in order to provide low latency, high performance, and high availability of the hosted content.
content distribution network (CDN), or content delivery