Chapter 19: Protecting Your Network Flashcards

1
Q

Spoofing

A

The process of pretending to be someone or something you are not by placing false information into your packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocol Abuse

A

Doing things with a protocol that it wasn’t meant to do, usually to carry out an attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malformed packets

A

Packets with unwanted information in an attempt to break another system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack Surface

A

The way that an exploit takes advantage of a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attack Window

A

The time frame in which a bad guy can apply an attack surface against a vulnerability before patches are applied to prevent the exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Zero-day Attacks

A

New attacks using vulnerabilities that haven’t yet been identified or fixed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP Cache Poisoning

A

Target the ARP caches (storing known IPs and MAC addresses) on hosts and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARP Request

A

A special broadcast that a sending device sends out if it doesn’t know the destination device’s MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dynamic ARP Inspection (DAI)

A

Tool to prevent ARP poisoning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DHCP Snooping

A

Switch process that monitors DHCP traffic, filtering out DHCP messages from untrusted sources.
Typically used to block attacks that use a rogue DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial of Service (DoS) attack

A

A targeted attack on a server that provides some form of service on the Internet, with the goal of making that site unable to process any incoming server requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Amplification

A

The aspect of a DoS attack that makes a server do a lot of processing and responding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Jamming

A

The process of sending artificial jam signals that effectively prevent any other station on the collision domain from transmitting its data onto the network. (Fixed by switches!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Distributed DoS (DDoS)

A

Uses many many computers under the control of a single operator to launch a coordinated attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Zombie

A

A single computer under the control of an operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Botnet

A

A group of computers under the control of one operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Reflection

A

Requests are sent to normal servers as if they had come from the target server and the responses from the normal servers are reflected to the target server, overwhelming it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Smurf Attack

A

A form of DoS attack that sends broadcast pings to the victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Friendly/Unintentional DoS

A

Caused by too much legitimate traffic on a server that is too weak to handle it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Permanent DoS

A

An attack that damages the targeted machine and renders that machine inoperable. (Also known as phlashing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Man-in-the-middle

A

An attacker taps into communications between two systems, intercepting traffic, reading or manipulating it, then sending it on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Session Hijacking

A

Tries to intercept a valid computer session to get authentication information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Packet Sniffing

A

Intercepting packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Banner Grabbing

A

When a malicious user probes a host’s open ports to learn details about running services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

VLAN Hopping

A

Older technique to hack a switch to change a normal switch port from an access port to a trunk port, the hacker to access different VLANs.

26
Q

Virus

A

A program that can make a copy of itself without your necessarily being aware of it.
All viruses carry some payload that may or may not do something malicious.

27
Q

Worm

A

A form of virus that doesn’t infect other files on the computer, but replicates by making copies of itself on other systems on a network.

28
Q

Macro

A

A type of virus that exploits application macros to replicate and activate.

29
Q

Trojan Horse

A

A piece of malware that pretends to do one thing, but actually does something evil.
They don’t replicate

30
Q

Rootkit

A

A Trojan horse that takes advantage of very low level operating system functions to hide itself from all but the most aggressive of anti-malware tools

31
Q

Adware

A

A program that monitors the types of Web sites you frequent and uses that info to generate targeted advertisements.

32
Q

Spyware

A

A function of any program that sends info about your system or your actions over the Internet

33
Q

Social Engineering

A

The process of using or manipulating people inside the networking environment to gain access to that network from the outside.

34
Q

Phishing

A

The attacker poses as some sort of trusted site in an attempt to get you to reveal sensitive information.

35
Q

Services

A

Background programs in an operating system that do behind-the-scenes grunt work that users don’t need to interact with on a regular basis.

36
Q

What can you do if you really want to use insecure protocols?

A

Run them through a VPN

37
Q

RF Emanation Vulnerability

A

Radio waves can penetrate walls to a certain extent, and accidentally spill into other areas.

38
Q

TEMPEST

A

The NSA’s security standard that is used to combat RF emanation by using enclosures, shielding, and even paint.

39
Q

Tailgating

A

When a locked door is opened by an authorized person and an unauthorized person tries to sneak in behind them

40
Q

IP Camera

A

Still-frame or video camera with a network interface and TCP/IP protocols to send output to a network resource or destination

41
Q

Closed-Circuit Televisions (CCTVs)

A

A self-contained, closed system in which video cameras feed their signal to specific, dedicated monitors and storage devices.

42
Q

Principal of Least Privilege

A

Promotes minimal user profile privileges on computers, based on users’ job necessities.

43
Q

Unauthorized Access v. Improper Access

A

Unauthorized access is when a person does something out of the scope of his authority, and improper access occurs when a user who shouldn’t have access gains access through some means

44
Q

Network Access Control (NAC)

A

A standardized approach to verify that a node meets certain criteria before it is allowed to connect to a network.

45
Q

Posture Assessment

A

Process by which a client presents its security characteristics to an access control server.

46
Q

Agent

A

A process or program running within the computer that scans the computer to create an inventory of configuration info, resources, and assets

47
Q

Persistent Agent

A

An agent that once installed stays installed and runs every time the computer boots up.

48
Q

Non-persistent Agent

A

Downloaded and run when needed, then released when the connection ends

49
Q

Guest Network

A

A network separate from your main network that you intend for visitors and clients to use.

50
Q

Quarantine Network

A

Where a node may be sent when it is denied connection to the production network.

51
Q

Rogue Anti-Malware

A

A malware program that poses as anti-malware.

52
Q

Top-talkers

A

Systems with very high network output

53
Q

Signature

A

Code pattern of a known virus

54
Q

Firewall

A

Blocks or allows traffic to move through based on a set of rules

55
Q

Stateful Inspection

A

Component of firewalls giving the capability to tell if a packet is part of an existing connection by looking at its relation to other packets

56
Q

Deep Packet Inspection (DPI)

A

Firewalls with DPI filter based on the application or service that originated the traffic.

57
Q

Content Filtering

A

Enables admins to filter traffic based on specific signatures or keywords.

58
Q

Demilitarized Zone (DMZ)

A

A lightly protected or unprotected subnet network positioned between an outer firewall and an organization’s highly protected internal network.
Used mainly to host public address servers such as Web servers.

59
Q

Bastion Host

A

A machine that is fully exposed to the Internet.

60
Q

Honeypot

A

A computer that presents itself as a tempting target to a hacker, but is a decoy.

61
Q

Honeynet

A

A honeypot made to look like a whole network.