Lesson 7: Security Flashcards

1
Q

Access Lists (ACLs)

A

A basic form of firewall protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AES

A

Advanced Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AH

A

Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Brute Force Attack

A

Attacker uses every possible combination of characters for the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Buffer Overflow

A

Happens when a program tries to put more data into a buffer than it was configured to hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

netstat -a -b

A

(a) Command used to display the ports currently open on a Windows operating system and (b) used to display the executable involved in creating the connection or listening port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CCMP

A

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CHAP

A

Challenge Handshake Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Demilitarized Zones (DMZs)

A

Used to isolate the servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Denial of Service (DoS)

A

A service is being denied to a computer, network, or server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DES, 3DES

A

Data Encryption Standard, Triple Data Encryption Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dictionary Attack

A

Uses known passwords and many variations (upper and lowercase and combinations) to try to log in to your account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Diffie-Hellman

A

Key generation algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Directed Broadcast

A

The broadcast is sent to a specific subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ESP

A

Encapsulating Security Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewall

A

Used in computer networks for protecting the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fraggle

A

A DoS attack in which spoofed UDP packets are sent to a network’s broadcast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

GRE

A

Generic Routing Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IKE

A

Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IP Tunnel

A

An IP packet encapsulated in another IP packet

21
Q

IPsec

A

Used to encrypt data between various networking devices

22
Q

ISAKMP

A

Internet Security Association and Key Management Protocol

23
Q

Jamming

A

The wireless network is overwhelmed with wireless traffic, thereby jamming the network

24
Q

L2F

A

Layer 2 Forwarding

25
L2TP
Layer 2 Tunneling Protocol
26
LEAP
A wireless security system used by Cisco
27
Malware
Malicious programs
28
MD5
Message Digest 5
29
NAQC
Network Access Quarantine Control
30
nmap
A Linux port scanner
31
Packet Filtering
A limit is placed on the information that can enter the network
32
Packet Sniffing
A technique in which the contents of data packets are watched
33
PAP
Password Authentication Protocol
34
Password Cracking
The attacker tries to guess the user's password
35
Penetration Testing
A way to evaluate the security of the user's network
36
permit ip any any
The instruction added to the last line of an access list to allow all other data packets to enter and exit the router
37
Ping of Death
A DoS attack that uses oversized ICMP datagram to crash IP devices
38
PPTP
Point-to-Point Tunneling Protocol
39
Proxy Server
Clients go through a proxy to communicate with secure systems
40
SHA
The secure hash algorithm
41
SHA-1
Secure Hash Algorithm
42
Shared key Authentication
Both the client and the access point share a key called a pre-shared key (PSK)
43
Social Engineering
A way for an intruder to obtain enough information from people to gain access to the network
44
Spoof
Inserting a different IP address in place of an IP packet's source address to make it appear that the packet came from another network
45
Stateful Firewall
Keeps track of the data packet flow
46
TKIP
Temporal Key Integrity Protocol
47
Virus
A piece of malicious computer code that, when opened, can damage your hardware, software, or other files
48
WEP
Wired equivalent privacy
49
Worm
A type of virus that attacks computers, typically proliferates by itself, and can deny service to networks