Domain 4 - Communications and Network Security Flashcards
What is a smurf attack?
A DDoS attack. Directs large volumes of spoofed ICMP packets to a computer network using an IP broadcast address.
What is a fraggle attack?
A DDoS attack directing large volumes of traffic to UDP/7 (echo) and UDP/19 (CHARGEN)
What is a LAND attack?
A spoofed TCP SYN packet directed to open port on victim IP address with spoofed source IP and destination. Causing the machine to reply to itself on end.
What is Code Red?
A worm that exploited a buffer overflow vuln targeting Microsoft IIS web servers.
What is a teardrop attack?
A DoS attack conducted by targeting TCP/IP fragmentation reassembly codes, causing fragmented packets to overlap one another on the host receiving them.
How long is the typical mac address?
48 bits. Where the first 24 bits are the OUI and last 24 is the serial number called (EI).
How longe are IPv6 MAC addresses?
They are now 64 bits. The first 24 is still the OUI and last 40 bits form the serial
What is the difference between monitor mode and promiscuous mode?
Monitor mode allows for packet capture without first associating with the AP. Promicious mode requires an administrator to configure the NIC into promiscuous mode.
What port is SQL?
Port 1433 TCP
What port is DNS?
UDP 53
What port is DHCP?
UDP 67 and 68
What port is LPD?
TCP 515
What port is Telnet?
TCP 23
What port is FTP?
Port 20 and 21
What port is SNMP?
UDP 161
What is frequency hopping spread spectrum (FHSS)?
Uses whole band in small intervals
What is direct sequence spread spectrum (DSSS)
Spread radio energy over a single channel, i.e. uses the whole hand at once
What is Orthogonal Frequency-Division Multiplexing (OFDM)?
Uses multiple simultaneous transmissions over a single channel
What is the IEEE for Bluetooth?
802.15
What encryption does IEEE 802.15 v2.1 use?
E0 symmetric cipher. It uses 128bit key but is only as strong as 38 bits. This is a weak cipher.
What cipher does IEEE 802.15 v4.1 use?
AES with CBC-MAC (AES-CCM)
What is bluesnarfing?
an attacker gains unauthorised access to the bluetooth device
What is bluekjacking?
sending unsolicited messages to a victim via hijacked bluetooth connection
What is bluebug?
malicious user makes calls, eavesdrop, sends SMS, download and modify phone data.
What is wireless access protocol?
WAP is designed to provide secure web services to handheld wireless devices such as smart phones and PDAs.
How many collision domains does a bridge have?
- One on each side.
How many collision domains do repeaters and hubs have?
1
What is port isolation?
Port isolation allows a network administrator to prevent traffic from being sent between specific ports
What types of EAP should no longer be used?
EAP-MD5, LEAP, EAP-FAST
What is a datagram?
This is a UDP data
What is a segment?
A TCP Stream