Communications and Network Flashcards

1
Q

Directory traversal

A

Directory traversal is an HTTP exploit which allows attackers to access restricted directories and execute commands outside of the web server’s root directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FQDN

A

Fully Qualified Domain names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Class of IP address

A

Class A - 1 to 127
Class B - 128 to 191
Class C - 192 to 223
Class D - 224 to 239

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PPP and SLIP

A

The Point-to-Point Protocol (PPP) is
an encapsulation protocol designed to support the transmission of IP traffi over dial-up
or point-to-point links. PPP includes a wide range of communication services, including
assignment and management of IP addresses, management of synchronous communications,
standardized encapsulation, multiplexing, link confi guration, link quality testing,
error detection, and feature or option negotiation (such as compression). PPP was originally
designed to support CHAP and PAP for authentication. However, recent versions of PPP
also support MS-CHAP, EAP, and SPAP. PPP replaced Serial Line Internet Protocol (SLIP).
SLIP offered no authentication, supported only half-duplex communications, had no errordetection
capabilities, and required manual link establishment and teardown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CHAP

A

Uses MD5 challenge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICMP Message Reject and Drop

A

Reject allows failed traffic to create an ICMP error message and return it to the sending device.
Drop silently discards any traffic that is not allowed into the network or that creates an ICMP error message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethernet

A

Baseband Technology

Star or Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DSL, Cable Modem, cable TV

A

Broadband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Anycast

A

Anycast addressing routes datagrams to a single member of a group of potential receivers that are all identified by the same destination address. This is a one-to-nearest association.
Broadcast addressing uses a one-to-many association, datagrams are routed from a single sender to multiple endpoints simultaneously in a single transmission. The network automatically replicates datagrams as needed for all network segments (links) that contain an eligible receiver.
Multicast addressing uses a one-to-unique many association, datagrams are routed from a single sender to multiple selected endpoints simultaneously in a single transmission.
Unicast addressing uses a one-to-one association between destination address and network endpoint: each destination address uniquely identifies a single receiver endpoint.
Geocast refers to the delivery of information to a group of destinations in a network identified by their geographical locations. It is a specialized form of Multicast addressing used by some routing protocols for mobile ad hoc networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WAN

A

Digital Data Service - Circuit Switch

Frame Relay, X.25, ATM - Packet Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APIPA Automatic Private IP Addressing

A

Automatic address scheme when no address server is found or if DHCP fails
169.254.0.1 to 169.254.255.254 with Class B subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port Spanning

A

Allows one port to see another port’s traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ethernet switch

A

Perform physical segmentation and not logical segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Type of attacks to overcome the segmentation of switch

A

1) Flooding - Process of sending large traffic in to the network. Flood with MAC address and switch will act as Hub
2) ARP Poisoning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wormhole attack

A

The attacking node captures the packets from one location and transmits them to other distant located node which distributes them locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Blackhole Attack

A

destination when data is sent to a nonexistent receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Tunneling Attack

A

Method to move the data between attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

out-of-band attack

A

Was DOS attack against Windows 95 and windows for Workgroups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IPSec Transport adjacency

A

More than one secuirty protocol (AH and ESP) is used in VPN tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IPSec Internal Tunneling

A

Used if traffic needs different levels of protection at different junctions of its path. For internal needs only AH but for external needs ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Is Modem asynchronous

A

Yes, Transmitted data can travel at any time, can be any length, and uses stop and start delimiters.

22
Q

Wireless Application Protocol

A

Wireless Application Protocol (WAP) was designed to meet the needs of a variety of wireless devices.
Class 1 is anonymous authentication,
Class 2 is server authentication
Class 3 is two-way client/server authentication.
One of the WAP protocol - WTLS Wireless Transport Layer Security

23
Q

Exterior Routing Protocol

A

BGP

24
Q

Interior Routing Protocol

A

OSPF, RIP

25
Q

TSIG - Transaction Signature

A

Used primarily by the Domain Name System (DNS) to provide a means of authenticating updates to a DNS database. It is most commonly used to update Dynamic DNS or a secondary/slave DNS server.

26
Q

Bluejagging

A

Transmit SMS-like message to the phone

27
Q

BlueSnarfing

A

Connect with device via bluetooth without owners knowledge and extract information

28
Q

Bluebugging

A

get hackers remote control over the phone

29
Q

Application Proxy

A

Make decision based on protocol command structure and understand the granularity of protocol

30
Q

Circuit proxy

A

Make decisions based on the header information

31
Q

Metro Ethernet - MAN Protocol

A

Access Layer - Connects customer network to SP’s aggregation network
Aggregation Layer - Occurs on distribution network
Metro Layer - Is the Metropolitan Area Network
Core Layer - Connects different Metro network

32
Q

DHCP Snooping

A

Ensures that DHCP servers can assign IP addresses to only selected systems,identified by their MAC addresses.

33
Q

SYN Flood

A

Half open DOS attack

34
Q

DNSSEC - DNS Secuirty Exchange

A

If DNSSEC were enabled on a DNS server, then the server would, upon receiving a response, validate the digital signature on the message before accepting the information to make sure that the response is from an authorized DNS server.

35
Q

Email - Sender Policy Framework - SPF

A

Sender policy framework (SPF) is an e-mail validation system designed to prevent spam and malicious e-mail by detecting e-mail spoofing. Attackers commonly spoof e-mail addresses to try and fool the receiver into thinking that the message came from a known and trusted source. SPF allows network administrators to specify which hosts are allowed to send mail from a given domain by implementing an SPF record in the Domain Name System (DNS)

36
Q

Socket

A

When a TCP or UDP message is formed, a source and a destination port are contained within the header information along with the source and destination IP addresses. This makes up a socket, which is how packets know where to go—by the address—and how to communicate with the right service or protocol on the other computer—by the port number

37
Q

VPN Tunneling Protocol for dial up

A

PPTP

38
Q

DNS Sppofing - REcursive and Iterative query

A

In a recursive query the DNS server often forwards the query to another server and returns the inquirer the proper response. In an iterative query, the DNS server responds with an address for another DNS server that might be able to answer the question, and the client then proceeds to ask the new DNS server. Attackers use recursive queries to poison the cache of a DNS server. In this manner, attackers can point systems to a web site that they control and that contains malware or some other form of attack. Here’s how it works: An attacker sends a recursive query to a victim DNS server asking for the IP address of the domain www.logicalsecurity.com. The DNS server forwards the query to another DNS server. However, before the other DNS server responds, the attacker injects his own IP address. The victim server accepts the IP address and stores it in its cache for a specific period of time. The next time a system queries the server to resolve www.logicalsecurity.com to its IP address, the server will direct users to the attacker’s IP address. This is called DNS spoofing or DNS poisoning.

39
Q

Cybersquating

A

Cybersquatting occurs when an attacker purchases a well-known brand or company name, or variation thereof, as a domain name with the goal of selling it to the rightful owner. In the meantime, the company can be misrepresented to the public.

40
Q

ISDN PRI Primary Rate interface

A

2 to 23 B channel
One 64kbps D channel

193 to 1544 Kbps

41
Q

Ethernet

A

Transmits timing info with preamble of 1 and 0.

Use CSMA/CD

42
Q

ARP request never leave broad cast domain and never pass router.

True or False

A

True

43
Q

IP protocol field value

A

ICMP 0x01
TCP 0x06
UDP 0x11
IGRP 0x58

44
Q

Types of XSS Vulnerablity

A

Persistent or second order
Non Persistent or Reflected
DOM based

45
Q

Persistent or second order XSS vulnerability

A

Targets web sites that allow users to input data that is stored in a database.
CM: Secure Programming practices

46
Q

Non Persistent or reflected XSS Vulnerability

A

Attacker tricks the victim into opening a URL programmed with a rogue script to steal the victim’s sensitive information, such as a cookie or session ID

47
Q

DOM - Document Object Model (DOM) Based XSS Vulnerability

A

Modify the original client-side JavaScript. This causes the victim’s browser to execute the resulting abusive JavaScript code. Thus, cross-site attacks can be used to exploit vulnerabilities in the victim’s web browser. Once the system is successfully compromised by the attacker, he may further penetrate into other systems on the network or execute scripts that may spread through the internal network.
CM:
Disable scripting language support in the browser.
Content filtering proxy servers

48
Q

Cybersquating

A

Cybersquatting occurs when an attacker purchases a well-known brand or company name, or variation thereof, as a domain name with the goal of selling it to the rightful owner. In the meantime, the company can be misrepresented to the public.

49
Q

Virtual Firewall - Bridge mode

A

Monitor individual traffic links between virtual machines, or they can be integrated within the hypervisor of a virtualized environment

50
Q

Virtual Firewall - Hypervisor Mode

A

he hypervisor is the software component that carries out virtual machine management and oversees guest system software execution. If the firewall is embedded within the hypervisor, then it can “see” and monitor all the activities taking place within the host system.