lesson 2 Flashcards

1
Q

nist special publication 800-41

A

-security guideline recommending that you block incoming ping traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

malicious ping

A

-attackers can observe the ttl values in ping replies to identify operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

juniper ttl value

A

64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

linux 2.4 ttl value

A

255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

red hat ttl value

A

64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

mac ttl value

A

64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

windows ttl value

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

netstat

A

-used to determine if a particular service is listening on a network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

nslookup

A

-resolves hostnames to test dns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

nmap

A
  • network mapper

- used to fingerprint services on open ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

nmap scan types

A
  • sS, tcp syn
  • sT, tcp connect
  • sU, udp
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

nmap -sS

A
  • tcp syn
  • default option
  • doesnt complete tcp connections
  • stealthy
  • can identify open, closed, and filtered ports
  • requires root privileges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

nmap -sT

A
  • tcp connect
  • default without root privileges
  • connections are completed
  • connections are logged by the target
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

nmap -sU

A
  • udp scan
  • used to scan for udp services
  • slower and more difficult to scan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

nmap options

A
  • port specification (p )
  • ping scan, disable port scan (-sn)
  • treat all hosts as online, skip host discovery (-Pn)
  • never do dns resolution (-n)
  • service fingerprinting (-sV)
  • increase verbosity (-v, -vv)
  • display the reasoning for nmaps’ findings (–reason)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

network traffic traveling through a windows firewall can be allowed or blocked based on

A
  • programs
  • services
  • protocols
  • ports
  • local ip
  • remote ip
17
Q

windows firewall profiles

A
  • domain
  • private
  • public
18
Q

domain windows firewall profile

A
  • networks on which a dc could be used for authentication

- used for corporate networks

19
Q

private windows firewall profile

A
  • can be selected by the end user

- used for home networks

20
Q

public windows firewall profile

A
  • default profile

- used for public networks

21
Q

netfilter

A
  • packet filtering framework built into the linux kernel
  • stateless packet filtering
  • stateful packet filtering
  • network address translation
  • port address translation
  • uses kernel hooks at which packets can be interacted with ex. ip tables
22
Q

iptables

A
  • standard firewall in many linux distributions

- used to configure and view tables of packet filter rules

23
Q

iptables parts

A
  • rules
  • targets
  • chains
24
Q

iptables rule match characteristics

A
  • packet protocol type
  • source address
  • destination address
  • source port
  • destination port
  • network interface being used
  • relation to previous packets
25
Q

iptables targets

A
  • what to do with packets that match a rule
  • accept
  • drop
  • return
26
Q

iptables chains

A
  • collections of rules checked sequentially
  • stops at first match
  • input
  • output
  • forward
27
Q

iptables default policy

A
  • applied if a packet matches no other rules in a chain

- often set to drop to block all traffic that is not explicitly allowed by a rule