Guide to Network Security Flashcards

1
Q

What are protocols

A

Forms of ceremony and etiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Most common protocol used by LANs and internet

A

TCP /IP or Transmission Control Protocol / Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocol is TCP/IP

A

TCP/IP comprises several protocol that function together. They are called protocol suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Basics TCP/IP protocols that relate to Security

A
ICPM
SNMP
DNS
File transfer and storage 
Telnet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does ICMP do

A

ICMP : Internet Control Message Protocol
It handles communication between devices.

ICMP messages are divided into two classes

    • Informational and query messages
    • Error messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Informational and query messages

A

These messages are used for devices to exchange information and perform testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Error messages

A

provide feedback to another device about an error that has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attack of ICMP

A
  • *Network discovery - reconnaissance to discover information about host
  • *Smurf attack - broadcast a ping request to all computers on the network causing crash
  • *ICMP redirect attack - redirect packet is sent to the victim asking the host to send its to another router (malicious device)
  • *Ping of death - Malformed ICMP sent to victim’s computer causing the host to crash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does SNMP do

A

A popular protocol used to manage network equipment

It allows network administrators to remotely monitor, manage, and configure devices on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

community string

A

protected password that agents that managed devices used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of Community Strings

A

** A read -only string : which allows information from the agent to be viewed

** Read-Write String : Allows settings on the device to be changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Default SNMP community strings for read only and read-write

A

Public and Private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does DNS do

A

Domain Name System - It resolves a symbolic name with its corresponding IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attack toward DNS

A
    • DNS poisoning : Substitutes addresses so that computer is redirected to another device
    • DNS transfer : ask valid DNS server for zone transfer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

File Transfer Protocol FTP

A

Transferring files can be done using FTP; WHICH IS INSECURE.

Used to connect to an FTP server, much in the same way that HTTP links to a web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to use FTP on a local computer

A
    • From a command prompt - at the operating system
    • Using a web browser - by entering preface ftp://
    • Using a FTP client
17
Q

Security vulnerabilities associated with using FTP

A

FTP does not use encryption ; so usernames, password could be accessed by using protocol analyzer

18
Q

Secure transmission over FTP

A

**FTP secure (FTPS) uses SSL or TLS to encrypt commands sent over port 21

** Secure FTP(SFTP) - an entire protocol

19
Q

NetBIOS - Network Basics Input/output System

A

A transport protocol used by Microsoft Systems to allow applications on separate computers to communicate over a LAN

20
Q

Information to gather when NetBios

A
  • *Computer Names
  • *Contents of the remote name cache including IP addresses
  • *List of local NetBios
  • *List of resolved names
21
Q

a rule-based management approach,

A

The process of administration that relies on following procedural and technical rules, instead of creating security elements “on the fly.”

22
Q

What is included in a device security

A

Establishing a secure configuration and implementing safe guards

23
Q

Logs

A

**A log record of events that occur.

** Security logs : Reveals the types of attacks that are being directed at the network and if any of the attacks were successful.

** Security access log : can provide details regarding requests for specific files on a system.

**Audit log : used to record which user performed an action and what that action was.

**System event logs : document any unsuccessful events and the most significant successful events (some system event logs can be tailored to specify the types of events that are recorded).

24
Q

Network Design Management should consider what

A

Network separation to prevent bridging, loop protection, and VLAN management.

25
Q

Clouds

A

**Public cloud : services and infrastructure are offered to all users with access provided remotely through the Internet

**Community cloud open only to specific organizations that have common concerns

** Private cloud is created and maintained on a private network

**Hybrid cloud is a combination of public and private clouds.

**Cloud storage has no computational capabilities but only provides remote file storage