CPSA Flashcards
What is on Port 123?
Network Time Protocol, NTP. TCP as UDP
What is on Port 110?
POP3, getting mails. TCP as UDP
What is on Port 19?
Character Generator, TCP as UDP
What is on Port 7?
Echo
What is on Port 5432?
Postgresql
What is on Port 23?
Telnet
What is on Port 520?
Routing Information Protocol, UDP
What is on Port 512?
R-exec
What is on Port 513?
R-Login
What is on Port 514?
R-Shell
What is on Port 79?
Finger
What is on Port MSSQL and hidden mode?
TCP port 1433 and Hidden 2433
What is the default port of Oracle database?
1521, TCP
What port is used for ipsec?
500 (Internet Key Exchange)
What does IKE stands for?
Internet Key Exchange
In computing, Internet Key Exchange (IKE, sometimes IKEv1 or IKEv2, depending on version) is the protocol
used to set up a security association (SA) in the IPsec protocol suite. IKE builds upon the Oakley protocol and
ISAKMP.[1] IKE uses X.509 certificates for authentication - either pre-shared or distributed using DNS
(preferably with DNSSEC) and a Diffie–Hellman key exchange - to set up a shared session secret from
which cryptographic keys are derived.[2][3] In addition, a security policy for every peer which will connect
must be manually maintained.[2]
What does LSASS stands for?
Local Security Authority Subsystem Service (LSASS) is a process in Microsoft Windows operating systems that
is responsible for enforcing the security policy on the system. It verifies users logging on to a Windows
computer or server, handles password changes, and creates access tokens.[1] It also writes to the Windows
Security Log
What does SAM stands for?
The Security Account Manager (SAM) is a database file[1] in Windows XP, Windows Vista and Windows 7 that
stores users’ passwords. It can be used to authenticate local and remote users. Beginning with Windows 2000
SP4, Active Directory authenticates remote users. SAM uses cryptographic measures to prevent forbidden
users to gain access to the system.
What does EAP stands for?
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless
networks and point-to-point connections
What does WPA stands for?
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security
certification programs developed by theWi-Fi Alliance to secure wireless computer networks. The Alliance
defined these in response to serious weaknesses researchers had found in the previous system, Wired
Equivalent Privacy (WEP).[1]
What does SMS,SUS,WSUS, MBSA stands for?
Windows Update Agent (WUA) Systems Management Server (SMS) Server update services (SUS) Windows Server Update Services (WSUS) Microsoft Baseline Security Analyzer (MBSA)
What does OSPF stands for?
Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS).
What does RIP stands for?
The Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols which employ
the hop count as a routing metric
What does tkip stands for?
Temporal Key Integrity Protocol or TKIP /tikp/ was a stopgap security protocol used in the IEEE 802.11
wireless networking standard.
What does STP stands for?
The Spanning Tree Protocol (STP) is a network protocol that builds a logical loop-free topology for Ethernet
networks.
What does PGP stand for?
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for
data communication.
What does DES stands for ?
The Data Encryption Standard (DES, /diis/ or /dz/) is a symmetric-key algorithm for the encryption of electronic
data.
Successor is 3DES
What is the use of EICAR ?
EICAR is a text file with a signature recognised by all AV vendors to test if a virus is detected by the AV engine.
EICAR is not a virus by itself.
How does traceroute work?
Traceroute works by sending packets with gradually increasing TTL value, starting with TTL value of one. The
first router receives the packet, decrements the TTL value and drops the packet because it then has TTL value
zero. The router sends an ICMP Time Exceeded message back to the source.
What does AJAX stands for?
Ajax (also AJAX; /edæks/; short for asynchronous JavaScript and XML)[1][2][3] is a set of web development
techniques using many web technologies on the client-side to create asynchronous Web applications.
What does SOAP stands for?
SOAP (Simple Object Access Protocol) is a protocol specification for exchanging structured information in the
implementation of web services in computer networks.
What does IIS stands for?
Internet Information Services (IIS, formerly Internet Information Server) is an extensible web server created by
Microsoft for use with Windows NT family.
What does URI stands for?
Uniform Resource Identifier (URI) is a string of characters used to identify a
resource. Such identification enables interaction with representations of the resource over a network, typically
the World Wide Web
What does HTTP stands for?
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia
information systems.
What does FSMO stands for ?
Flexible Single Master Operations (FSMO, F is sometimes floating ; pronounced Fiz-mo), or just single master
operation or operations master, is a feature of Microsoft’s Active Directory (AD).[1] As of 2005, the term FSMO
has been deprecated in favour of operations masters.
What does NETBIOS stands for?
NetBIOS /ntb.s/ is an acronym for Network Basic Input/Output System. It provides services related to the
session layer of the OSI model allowing applications on separate computers to communicate over a local area
network. As strictly an API, NetBIOS is not a networking protocol.
B2) Network Architectures
WEP (Wired Equivalent Privacy)
64bit WEP Key (40 + 24 (IV) (Initialization Vector)
128bit WEP Key (104 + 24 (IV) (Initialization Vector)
B4) Network Mapping & Target Identification
Map route between engagement point and target:
- traceroute (uses UDP or ICMP echo)
- tcptraceroute (use TCP SYN)
- tracert (Windows)