Domain 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization. Flashcards
Wireshark
Protocol Analyzer - essentially the only one people use.
look at the current traffic on a network and allow you to view that traffic and capture a copy of the traffic for later analysis. •
pwdump
used to crack Microsoft passwords
Microsoft Baseline Security Analyzer (MBSA)
Active scanner that will interact directly with the target network
Nessus
1 vulnerability scanner in the world
exploitation framework
metasploit
obfuscate
to hide
honeypot
a single server used to entice an attacker
honeynet
an entire network or section of your network used to entice an attacker
SAN stands for
Storage Area Network
iSCSI
Slowest (7Gbps) and least expensive backup transport method
FCOE
fiber channel over ethernet (10Gbps) (backup transport method)
Fiber Channel
speed greater than 16Gbps (backup transport method)
NAS
Network attached storage. A drive that appears as one drive, but is composed of multiple drives. Each user has a disk quota, or space limit on the NAS.
DAS
Direct Attached Storage. A storage device directly connected to a server or computer. (ie. The harddrives in a server)
Grandfather
Monthly full backup with Taps. Stored off site.