Exam Prep (DION) Flashcards
What port does the Trivial File Transfer Protocol (TFTP) use?
TFTP uses port 69.
What port does the Simple Mail Transfer Protocol (SMTP) use?
SMTP uses port 25.
What port does the Hypertext Transfer Protocol (HTTP) use?
HTTP uses port 80.
What port does the Domain Name Service (DNS) protocol use?
DNS uses port 53.
What is Network Access Control (NAC) and what is its primary function?
Network Access Control (NAC) uses protocols to define and implement a policy for securing access to network nodes when a device initially attempts to access the network. It’s focused on controlling access to a network by enforcing security policies.
What is the role of a Security Information and Event Management (SIEM) system?
A SIEM system provides real-time analysis of security alerts generated by applications and network hardware.
How does an access control list differ from NAC in managing network access?
An access control list defines what ports, protocols, or IP addresses can be used, but unlike NAC, it cannot distinguish between different users or device types accessing the network.
Why is MAC filtering insufficient compared to NAC?
While MAC filtering can allow or deny network access, it cannot control which network resources are accessible from a single ethernet port, unlike NAC.
How does dual control differ from separation of duties?
Dual control requires two or more people to perform a critical action together, simultaneously. It’s often used in high-security situations.
What is the concept of separation of duties in an organization?
Separation of duties is a security concept where more than one person is required to complete a task.
What is the purpose of mandatory vacation policies in an organization?
Mandatory vacation policies require employees to take time away from their jobs. This practice helps in detecting fraud or malicious activities that might be easier to spot in the absence of the employee who is on leave.
What is a Community Cloud in the context of cloud computing?
A Community Cloud is a form of cloud computing where the cloud infrastructure is shared among different organizations that belong to the same community or have similar computing concerns.
What are the security vulnerabilities of Telnet that make it insecure?
Telnet is considered insecure because it transmits all data in plain text, including sensitive information such as usernames, passwords, commands, and data files. This lack of encryption makes it vulnerable to eavesdropping and interception, as unauthorized parties can easily access unencrypted data transmitted over the network.
What is the purpose of traceroute/tracert commands?
Traceroute and tracert are diagnostic tools used to display packet routes and measure delays in IP networks. Traceroute uses ICMP, not TCP, for its analysis.
What is Broadcast ping and its limitation?
Broadcast ping sends pings to a subnet’s broadcast IP. Its limitation is that if a regular ping fails, broadcast ping will also be ineffective.
What is Ptunnel?
Ptunnel is an application that tunnels TCP connections via ICMP echo requests and replies.
Why are authenticated scans important in internal network assessments?
Authenticated scans accurately assess vulnerabilities due to deeper access, crucial in uniform enterprise networks.
Why are uncredentialed scans less effective for vulnerability detection?
Uncredentialed scans lack deep system access, missing many vulnerabilities due to limited permissions.
What is a limitation of the Lockheed Martin cyber kill chain model?
The Lockheed Martin model assumes a unidirectional attack flow, overlooking the possibility of an adversary retreating during an attack.
How do MITRE, Diamond, and AlienVault models differ from the Lockheed Martin model?
MITRE and Diamond offer more dynamic systems, accommodating a broader range of adversary behaviors. AlienVault was designed to overcome the rigidity of the Lockheed Martin model.
Why is patching not effective against zero-day threats?
Zero-day threats exploit unknown flaws, with no available patches at the time of discovery, making traditional patching ineffective.
What strategies can protect against zero-day attacks?
To mitigate zero-day attacks, use network segmentation, application whitelisting, and threat intelligence for enhanced defense.
Why is patching not effective against zero-day threats?
Zero-day threats exploit unknown flaws, with no available patches at the time of discovery, making traditional patching ineffective.
What strategies can protect against zero-day attacks?
To mitigate zero-day attacks, use network segmentation, application whitelisting, and threat intelligence for enhanced defense.
How can you determine if SSH is operating from nmap scan results?
Check if port 22 is open. SSH operates over port 22, so its absence in open ports indicates SSH is not active.
What ports indicate the operation of web servers?
Web servers use port 80 for HTTP and 443 for HTTPS. Their presence in nmap results signifies active web services.
Which ports are used by database servers and what do they indicate?
Port 1433 is used by Microsoft SQL and 3306 by MySQL. Their open status in nmap results points to active database services.
How to identify if Remote Desktop Protocol is in use from nmap results?
Check for port 3389. If it’s open, it indicates that Remote Desktop Protocol is being used.