Chapter 2 Flashcards
What type of firewall is best against a SYN flood attack?
Stateful Packet Inspection SPI
What does NAC do?
A network management solution and that enables only those devices that accept the policy to the network
What does IPsec transport do?
Only encrypts data of packet
What wireless access point has minimal functionality?
Controller-based
What does S/MIME do?
It encrypts emails and digitally signs them.
What is the benefit of SNMP V3?
All data is encrypted
What is good about ANT?
Low power, sleep long time low power
What windows software helps prevent malware by requiring user authorization to run executables?
DEP - Data Execution Prevention
What is Heuristic scanning?
Scans for anomalous behavior
What is enumeration?
the process of extracting user names, machine names, network resources, shares and services from a system.
What is LDAP?
a directory of the network
What is FTPS?
File transfer protocol with SSL/TLS and uses digital certificates to secure file transfer
What is the protocol for transmitting VoIP?
SRTP Secure Real Time Transport Protocol
What is Affinity?
Load balancer will always use the same server for a particular user or a particular application instance.
What is an application proxy?
When the client and the server are incompatible for direct connection to obtain the requested service you use an application proxy
What does the -n command do?
Sets number of ping packets to send
What does the -l command do?
Sets the size of the packets
What is (FRR) False Rejection Rate?
The rate at which authentication attempts are rejected when they should have succeeded.
What is (FAR) False Acceptance Rate?
The rate at people who should not be authenticated are.
What is (CER) crossover error rate?
The rate at which FAR and FRR are equal.
What is ERR equal error rate?
Another name for CER.
What is WORM storage?
Write Once Ream Many. High Capacity, cannot be edited.
What is a credential scan?
Giving testers logins. Also know as privileged scan.
What does Data Execution Prevention do?
Specifically monitors programs from accessing system memory and prevents that.
What does netstat -a do?
Shows listening ports
What does nmap -0 do?
to guess the operating system
What does -PT do?
do a ping with TCP
What does -T1 do?
a very slow scan
How many times should you wipe a hard drive?
7 times
What does Network Address Allocation do?
Can limit how many IP addresses are requested from a single network segment.
What does SIP stand for?
Session Initiation Protocol
What is the equation to determine the size of a subnet based CIDR?
[2^(32-N)]-2
What port is L2TP?
1707
What port is PPTP?
1727
What port is for media gateway?
2427
What does -T5 do?
Very fast scan
What does -sT mean?
TCP Full connect scan
What does -sW mean?
Windows scan
What does -s0 mean?
Protocol scan that will check all protocols?