Chapter 2 Flashcards

1
Q

What type of firewall is best against a SYN flood attack?

A

Stateful Packet Inspection SPI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does NAC do?

A

A network management solution and that enables only those devices that accept the policy to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does IPsec transport do?

A

Only encrypts data of packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What wireless access point has minimal functionality?

A

Controller-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does S/MIME do?

A

It encrypts emails and digitally signs them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the benefit of SNMP V3?

A

All data is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is good about ANT?

A

Low power, sleep long time low power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What windows software helps prevent malware by requiring user authorization to run executables?

A

DEP - Data Execution Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Heuristic scanning?

A

Scans for anomalous behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is enumeration?

A

the process of extracting user names, machine names, network resources, shares and services from a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is LDAP?

A

a directory of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is FTPS?

A

File transfer protocol with SSL/TLS and uses digital certificates to secure file transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the protocol for transmitting VoIP?

A

SRTP Secure Real Time Transport Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Affinity?

A

Load balancer will always use the same server for a particular user or a particular application instance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an application proxy?

A

When the client and the server are incompatible for direct connection to obtain the requested service you use an application proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the -n command do?

A

Sets number of ping packets to send

17
Q

What does the -l command do?

A

Sets the size of the packets

18
Q

What is (FRR) False Rejection Rate?

A

The rate at which authentication attempts are rejected when they should have succeeded.

19
Q

What is (FAR) False Acceptance Rate?

A

The rate at people who should not be authenticated are.

20
Q

What is (CER) crossover error rate?

A

The rate at which FAR and FRR are equal.

21
Q

What is ERR equal error rate?

A

Another name for CER.

22
Q

What is WORM storage?

A

Write Once Ream Many. High Capacity, cannot be edited.

23
Q

What is a credential scan?

A

Giving testers logins. Also know as privileged scan.

24
Q

What does Data Execution Prevention do?

A

Specifically monitors programs from accessing system memory and prevents that.

25
What does netstat -a do?
Shows listening ports
26
What does nmap -0 do?
to guess the operating system
27
What does -PT do?
do a ping with TCP
28
What does -T1 do?
a very slow scan
29
How many times should you wipe a hard drive?
7 times
30
What does Network Address Allocation do?
Can limit how many IP addresses are requested from a single network segment.
31
What does SIP stand for?
Session Initiation Protocol
32
What is the equation to determine the size of a subnet based CIDR?
[2^(32-N)]-2
33
What port is L2TP?
1707
34
What port is PPTP?
1727
35
What port is for media gateway?
2427
36
What does -T5 do?
Very fast scan
37
What does -sT mean?
TCP Full connect scan
38
What does -sW mean?
Windows scan
39
What does -s0 mean?
Protocol scan that will check all protocols?