Chapter 11: Secure Network Architecture and Components Flashcards

1
Q

Telnet Port

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FTP Port

A

20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TFTP Port

A

69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SMTP Port

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

POP3

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IMAP4 Port

A

143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DCHP

A

67 (server); 68 (client)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTP Port

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HTTPS Port

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

LPD Port

A

515

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NFS Port

A

2049

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SNMP

A

161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS Port

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The primary function of ______ is to provide mutual certificate authentication and encrypted sessions between devices during DNS operations.

A

DNSSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______ is the act of falsifying the DNS information used by a client to reach a desired system.

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _____ can listen in on network traffic for any DNS query or specific DNS queries related to a target site.

A

rogue DNS server

17
Q

A _____attempts to provide false responses to DNS queries from malware, such as bots, to prevent access to command and control systems.

A

DNS sinkhole

18
Q

_____ is the malicious action of changing the registration of a domain name without the authorization of the valid owner.

A

Domain hijacking

19
Q

____ is a practice employed to take advantage of when a user mistypes the domain name or IP address of an intended resource.

A

Typosquatting

20
Q

These attacks leverage similarities in character sets to register phony international domain names (IDNs) that to the naked eye appear legitimate

A

homograph attack

21
Q

______ is used to resolve IP addresses (32-bit binary number for logical addressing) into MAC addresses

A

Address Resolution Protocol (ARP)

22
Q

A ______is a formal assessment of wireless signal strength, quality, and interference using an RF signal detector.

A

site survey

23
Q

A _____ is a mapping of signal strength measurements over a building’s blueprint.

A

heat map

24
Q

A _____ portal is an authentication technique that redirects a newly connected client to a web-based portal access control page. The portal page may require the user to input payment information, provide logon credentials, or input an access code.

A

captive

25
Q

_____ is a DoS attack against a Bluetooth device that can be accomplished through transmission of garbage traffic or signal jamming.

A

Bluesmacking

26
Q

_____ is Bluetooth-focused network packet capturing.

A

Bluesniffing

27
Q

______ involves sending unsolicited messages to Bluetooth-capable devices without the permission of the owner/user. These messages may appear on a device’s screen automatically, but many modern devices prompt whether to display or discard such messages.

A

Bluejacking

28
Q

______ is the unauthorized access of data via a Bluetooth connection.

A

Bluesnarfing

29
Q

______ grants an attacker remote control over the hardware and software of your devices over a Bluetooth connection.

A

Bluebugging

30
Q

_____ is someone using a detection tool to look for wireless networking signals, often ones they aren’t authorized to access.

A

War driving

31
Q

_____ is an attack in which a hacker operates a false access point that will automatically clone, or twin, the identity of an access point based on a client device’s request to connect.

A

Evil twin

32
Q

_____ attacks attempt to reestablish a communication session by replaying (i.e., retransmitting) captured traffic against a system.

A

Replay

33
Q

_______ wireless is widely used by SCADA systems to communicate over a distance or geographic space where cables or traditional wireless are ineffective or inappropriate.

A

Narrow-band

34
Q

_____ is an IoT equipment communications concept that is based on Bluetooth.

A

Zigbee

35
Q

A ______ network, is a collection of resource services deployed in numerous data centers across the internet in order to provide low latency, high performance, and high availability of the hosted content.

A

content distribution network (CDN), or content delivery