N10-007.6 Flashcards
FTP Bounce
An FTP bounce attack uses the FTP PORT command to covertly open a connection with a remote system. Specifically, an attacker connects to an FTP server and uses the PORT command to cause the FTP server to open a communications channel with the intended victim, which might allow a connection from the FTP server, while a connection directly from the attacker might be denied.
Root Guard
A switch protection mechanism for STP. The switch ensures that superior BPDU messages are ignored.
Intrusion Detection System (IDS)
IDS devices can recognize the signature of a well-known attack and respond to stop the attack. However, an IDS sensor does not reside inline with the traffic flow.
Denial of Service (DoS)
A DoS attack floods a system with an excessive amount of traffic or requests, which consumes the system’s processing resources and prevents the system from responding to many legitimate requests.
Site-to-Site VPN
Interconnects two sites, as an alternative to a leased line, at a reduced cost.
Flood Guard
Serves as a preventive control against denial of service (DoS) or distributed denial of service (DDoS) attacks. A Flood Guard is available either as a standalone device or as a firewall component. It is capable of monitoring network traffic to identify DoS attacks in progress generated through packet flooding.
Hardware Firewall
A network appliance dedicated to the purpose of acting as a firewall. This appliance can have multiple interfaces for connecting to areas of a network requiring varying levels of security.
Intrusion Prevention System (IPS)
IPS devices can recognize the signature of a well-known attack and respond to stop the attack. An IPS device resides inline with the traffic flow, unlike an IDS sensor.
DHCP Snooping
The process of securing the network against a rogue DHCP server attack or other types of DHCP security attacks.
Challenge-Response Authentication Mechanism Message Digest 5 (CRAM-MD5)
A common variant of HMAC frequently used in email systems. Like CHAP, CRAM-MD5 only performs one-way authentication (the server authenticates the client).
Terminal Access Controller Access-Control System Plus (TACACS+)
A TCP-based protocol used to communicate with an AAA server. Unlike RADIUS, TACACS+ encrypts an entire authentication packet rather than just the password. TACACS+ offers authentication features, but they are not as robust as the accounting features found in RADIUS. Also, unlike RADIUS, TACACS+ is a Cisco-proprietary protocol.
Asymmetric Encryption
With asymmetric encryption, the sender and receiver of a packet use different keys.
Layer 2 Tunneling Protocol (L2TP)
A VPN protocol that lacks security features, such as encryption. However, L2TP can still be used for a secure VPN connection if it is combined with another protocol that provides encryption.
Lightweight Directory Access Protocol (LDAP)
An open standard for storing directory information for the network such as usernames and passwords and other user and computer parameters.
Symmetric Encryption
With symmetric encryption, both the sender and the receiver of a packet use the same key (a shared key) for encryption and decryption.