Module 1: Introduction to Network Security Flashcards

1
Q

What is a vulnerability?

A

Weakness in the network and/or its protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a threat?

A

A set of circumstances that has the potential to cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is intrusion?

A

Any act or event that compromises the information on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a breach?

A

Breakdown of security of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an interruption intrusion and what is an example?

A
  • Making access to a resource become unavailable

- Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an interception intrusion and what is an example?

A
  • Gaining unauthorized access to information
  • Eaves dropping / sniffing
  • Traffic analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a modification intrusion and what is an example?

A
  • Tampering with a resource or information and changing it.

- Man in the middle (MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a fabrication intrusion and what is an example?

A
  • Insertion of counterfeit objects into a system

- Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an invasion intrusion and what is an example?

A
  • Taking control of a resource and steal information

- Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is active eavesdropping?

A

Send data probes & collect info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is passive eavesdropping?

A

Silent eavesdropping - no probes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Level 0 intrusion?

A

Normal system users - no intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Level 1 intrusion?

A

Intrusion occurs, but no evidence of damage and no trail is left.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Level 2 intrusion?

A

Intrusion occurs, but no evidence of damage but a trail is left.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Level 3 intrusion?

A

Files are damaged, programs and/or data are altered (e.g. Malware, MITM attack).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Level 4 intrusion?

A

Services disrupted (e.g. DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Level 5 intrusion?

A

Valuable information is stolen - cyber espionage cyber felony is committed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the four steps for a hacker to commit an attack?

A
  • Gather information
  • Look for vulnerabilities
  • Get access to the network
  • Launch the attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of information is useful for a hacker to gather information?

A
  • Domain names
  • IP addresses
  • Active ports
  • OS/CPU
  • Type of firewalls
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are NSLOOKUP and DIG? How are they used?

A
  • IP Address finder

- Gather information

21
Q

What is Netcraft? How is it used? How are they used?

A
  • Web server information gatherer

- Gather information

22
Q

What is traceroute, tracert and VisualRoute? How are they used?

A
  • IP address tracers

- Gather information

23
Q

What is iplocation.net? How is it used?

A
  • IP location finder (Geo location)

- Gather information

24
Q

What are nmap and zenmap? How are they used?

A
  • Port scanner ++ (veru detailed information about the host: hosts available, OS, packet filters and firewalls etc)
  • Gather information
25
Q

What is angry IP scanner? How is it used?

A
  • Port scanner (light weight)

- Gather information

26
Q

What is Wireshark? How is it used?

A
  • Traffic monitoring

- Gather information

27
Q

What is TCPDump? How is it used?

A
  • Traffic monitoring

- Gather information

28
Q

What is Netstumbler? How it is used?

A
  • Wireless network information gatherer // Active sniffer

- Gather information

29
Q

What is whois? How is it used?

A
  • Get domain information

- Gather information

30
Q

What is Kismet? How is it used?

A
  • Wireless network information gatherer // passive sniffer

- Gather information

31
Q

How can Google be used by hackers?

A

Social engineering tool used by hackers.

32
Q

What is Nessus? How is it used?

A
  • Vulnerability scanning (compliance and malware)

- Vulnerability testing

33
Q

What is Nexpose? How is it used?

A
  • For full cycle vulnerability assessment: detection, verification, risk calculation, impact analysis reporting and mitigation.
  • Vulnerability testing
34
Q

What is GFILANguard Network Security Scanner? How is it used?

A
  • Scans network IP by IP and alerts vulnerabilities.

- Vulnerability testing

35
Q

What is Nikto? How is it used?

A
  • Web server scanner (scans with a database)

- Vulnerability testing

36
Q

What is Nipper Studio? How is it used?

A
  • Vulnerability assessment scanner for switches, routers and firewalls.
  • Vulnerability testing
37
Q

What are the four tools used by hackers for gaining access?

A
  • Brute force
  • Password Crackers
  • Keyloggers
  • Address spoofers
38
Q

What is a Denial of Service attack?

A

Bring down a network so that legitimate users are prevented from accessing the network

39
Q

What is a man-in-the-middle-attack?

A
  • Secure position between a client and server
  • Impersonates either or
  • Data flows to attackers hose with no knowledge of the client or server
40
Q

What is data modification?

A
  • MITM attack extended to perform data modification
41
Q

What is a replay attack?

A

Replay recorded packets at a later time fot the same server

42
Q

What is an injection of malicious code attack?

A

Viruses, worms, trojan horses and logic bombs.

43
Q

What is confidentiality? How is it achieved?

A
  • No eavesdropping

- Cryptography

44
Q

What is integrity? How is it achieved?

A
  • Message received = message sent

- Cryptography

45
Q

What is authentication? How is it achieved?

A
  • Sender validation

- Cryptography

46
Q

What is non-repudiation? How is it achieved?

A
  • Source must not be able to deny a transaction

- Cryptography

47
Q

What is certification? How is it achieved?

A
  • Third party certifies the source as good

- Cryptography

48
Q

What is access control? How is it achieved?

A
  • Who can access what and when

- Firewalls

49
Q

What is availability? How is it achieved?

A
  • System resources are always available for legit users

- Firewalls