Domain 3.0: Implementation Flashcards
you can make LDAP traffic confidential and secure by using ____ technology operating over port ___
TLS, 636 (port LDAPS)
web traffic is unencrypted over ____ occurs by default over port ____
HTTP, 80
encrypted web traffic over ____ occurs by default over port _____
HTTPS, 443
FTP SSH uses ___ port ____ by default
TCP, 22
port security is a layer ___ traffic control feature that enables individual switch ports to be configured to allow only specified number of source MAC addresses coming in through the port
2
_____ protection makes additional checks in Layer 2 switched networks
loop
a ____ guard is a firewall feature to control network activity associated with DoS attacks
flood guard
____ code analysis is a white box software testing process for detecting bugs early in the program development
static
_____ code analysis is based on observing how the code behaves during execution
dynamic
_____ is a black box software testing process by which semi random data is injected into a program or protocol stack to detect bugs
fuzzing
_____ provides a safe execution environment fo untrusted programs
sandboxing
____ environments should be isolated from development environments
testing
____ environments reduce the risk of introducing issues before solutions are deployed in production
staging
______ can establish patterns of use that later can help identify variations that identify unauthorized access attempts
baselines
____ ____ use embedded systems with an os on the included chip
smart cards
the ______ SDLC (software development life cycle) model starts with a defined set of requirements and a well developed plan, and adjustments are confined to the current development stage
waterfall
the ____ SDLC model starts with less rigorous guidelines and allows for adjustments during the process
agile
____ ____ includes security in the SDLC, ensuring that security is built in during the development process
secure devOps
a __ _____ continually compiles, builds, and tests each new version of code committed to the central repository without user interaction
CI server
_______ means that a valuable program, configuration or server will never be modified in place
immutability
___ _____ involves disabling unnecessary ports and services
system hardening
to keep an attacker from exploiting software bugs, an organization must continually apply manufacturers’ ___ and _____
patches and updates
what port is Netstat commonly used for, purpose
15, lists active processes and who launched them, rarely used due to security concerns. Also same port as B2 Trojan
what port is FTP commonly used
20 or 21
port SSH/SFTP/SCP
22
port telnet
23
client/server app protocol that provides access to virtual terminals of remote systems on local area networks or the Internet
port SMTP
25, simple mail transfer protocol, insecure
port DNS
53
port HTTP
80
port NTP (network time protocol) and purpose
123
time synchronization, replaced with NTPsec port 4460
port LDAP, purpose
389
lightweight directory access protocol
reading and writing directories over an IP network. to query and update an X.500 directory
port HTTPS
443
port LDAPS
636
port FTPS
989 and 990
port RADIUS
1812
port RDP, purpose
3389, remote desktop protocol–connecting to another computer on the same network