Lesson 7: Security Flashcards

1
Q

Access Lists (ACLs)

A

A basic form of firewall protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Brute Force Attack

A

Attacker uses every possible combination of characters for the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Buffer Overflow

A

Happens when a program tries to put more data into a buffer than it was configured to hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

netstat -a -b

A

(a) Command used to display the ports currently open on a Windows operating system and (b) used to display the executable involved in creating the connection or listening port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CCMP

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CHAP

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Demilitarized Zones (DMZs)

A

Used to isolate the servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Denial of Service (DoS)

A

A service is being denied to a computer, network, or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DES, 3DES

A

Data Encryption Standard, Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dictionary Attack

A

Uses known passwords and many variations (upper and lowercase and combinations) to try to log in to your account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Diffie-Hellman

A

Key generation algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Directed Broadcast

A

The broadcast is sent to a specific subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ESP

A

Encapsulating Security Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewall

A

Used in computer networks for protecting the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fraggle

A

A DoS attack in which spoofed UDP packets are sent to a network’s broadcast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

GRE

A

Generic Routing Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IKE

A

Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IP Tunnel

A

An IP packet encapsulated in another IP packet

21
Q

IPsec

A

Used to encrypt data between various networking devices

22
Q

ISAKMP

A

Internet Security Association and Key Management Protocol

23
Q

Jamming

A

The wireless network is overwhelmed with wireless traffic, thereby jamming the network

24
Q

L2F

A

Layer 2 Forwarding

25
Q

L2TP

A

Layer 2 Tunneling Protocol

26
Q

LEAP

A

A wireless security system used by Cisco

27
Q

Malware

A

Malicious programs

28
Q

MD5

A

Message Digest 5

29
Q

NAQC

A

Network Access Quarantine Control

30
Q

nmap

A

A Linux port scanner

31
Q

Packet Filtering

A

A limit is placed on the information that can enter the network

32
Q

Packet Sniffing

A

A technique in which the contents of data packets are watched

33
Q

PAP

A

Password Authentication Protocol

34
Q

Password Cracking

A

The attacker tries to guess the user’s password

35
Q

Penetration Testing

A

A way to evaluate the security of the user’s network

36
Q

permit ip any any

A

The instruction added to the last line of an access list to allow all other data packets to enter and exit the router

37
Q

Ping of Death

A

A DoS attack that uses oversized ICMP datagram to crash IP devices

38
Q

PPTP

A

Point-to-Point Tunneling Protocol

39
Q

Proxy Server

A

Clients go through a proxy to communicate with secure systems

40
Q

SHA

A

The secure hash algorithm

41
Q

SHA-1

A

Secure Hash Algorithm

42
Q

Shared key Authentication

A

Both the client and the access point share a key called a pre-shared key (PSK)

43
Q

Social Engineering

A

A way for an intruder to obtain enough information from people to gain access to the network

44
Q

Spoof

A

Inserting a different IP address in place of an IP packet’s source address to make it appear that the packet came from another network

45
Q

Stateful Firewall

A

Keeps track of the data packet flow

46
Q

TKIP

A

Temporal Key Integrity Protocol

47
Q

Virus

A

A piece of malicious computer code that, when opened, can damage your hardware, software, or other files

48
Q

WEP

A

Wired equivalent privacy

49
Q

Worm

A

A type of virus that attacks computers, typically proliferates by itself, and can deny service to networks