Exam 2 Flashcards

1
Q

SYN FLOOD solutions

A

micro blocks, bandwidth throttling, SYN cookies, RST cookies, stack tweaking, stateful packet inspection firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

micro blocks

A

minimize requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

bandwidth throttling

A

limit from same IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SYN cookies

A

not kept in memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RST cookies

A

legit users TRY AGAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stack Tweaking

A

shorten time in buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

stateful packet inspection firewall

A

packet CONTEXT and CONTENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

HTTP

A

content transferred slowly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Host-Based Firewall

A

software based solution that runs on top of OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dual-Homed Host

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Router-base firewall

A

inspect/control traffic;easy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Screened Host

A

Bastion Host and Screened Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

network address translation

A

masks internal IP; supersedes proxy servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

preemptive blocking

A

detects intrusions through foot printing but can block legitimate traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

infiltration

A

goes into hacker world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

intrusion deflection

A

honey pot

17
Q

intrusion deterrence

A

not worth it

18
Q

anomaly detection

A

normal use is logged
- threshold monitoring
- resource profiling
- user/group work profiling
- executable profiling

19
Q

Specter

A

software honeypot solution
- open
- secure
- failing
- strange
- aggressive

20
Q

historic types of encryption

A
  • single alphabet substitution
  • multi-alphabet substitution
  • rail fence
  • Vigenère
  • enigma
  • binary operations
21
Q

symmetric encryption

A

one key
- DES (data encryption standard)
–> blowfish
–> AES (advanced encryption standard)
–> IDEA (international data encryption algorithm)
–> serpent
–> twofish

22
Q

key stretching

A

making key stronger and longer
- password-based key derivation function 2
- bcrypt

23
Q

pseudo-random number generator (PRNG)

A

makes cipher keys for symmetric encryption
- uncorrelated sequences
- long period
- uniformity

24
Q

public key encryption

A

public key to encrypt, private key to decrypt
- RSA (rivest, shamir, and adleman)

25
Q

Digital Signature

A

mathematically generated from HASH of something to be signed

26
Q

Digital Certificate

A

contains public key signed by trusted 3rd party
- X.509 is the standard for format and information in digital certificate

27
Q

Certificate Authority

A

sings the public key of a user
- registration authority
- public key infrastructurepre

28
Q

pretty good certificates

A

self-generated and doesn’t use CA; offers digital signatures, asymmetric encryption, and symmetric encryption