N10-007.6 Flashcards

1
Q

FTP Bounce

A

An FTP bounce attack uses the FTP PORT command to covertly open a connection with a remote system. Specifically, an attacker connects to an FTP server and uses the PORT command to cause the FTP server to open a communications channel with the intended victim, which might allow a connection from the FTP server, while a connection directly from the attacker might be denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Root Guard

A

A switch protection mechanism for STP. The switch ensures that superior BPDU messages are ignored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Intrusion Detection System (IDS)

A

IDS devices can recognize the signature of a well-known attack and respond to stop the attack. However, an IDS sensor does not reside inline with the traffic flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Denial of Service (DoS)

A

A DoS attack floods a system with an excessive amount of traffic or requests, which consumes the system’s processing resources and prevents the system from responding to many legitimate requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Site-to-Site VPN

A

Interconnects two sites, as an alternative to a leased line, at a reduced cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Flood Guard

A

Serves as a preventive control against denial of service (DoS) or distributed denial of service (DDoS) attacks. A Flood Guard is available either as a standalone device or as a firewall component. It is capable of monitoring network traffic to identify DoS attacks in progress generated through packet flooding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hardware Firewall

A

A network appliance dedicated to the purpose of acting as a firewall. This appliance can have multiple interfaces for connecting to areas of a network requiring varying levels of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Intrusion Prevention System (IPS)

A

IPS devices can recognize the signature of a well-known attack and respond to stop the attack. An IPS device resides inline with the traffic flow, unlike an IDS sensor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DHCP Snooping

A

The process of securing the network against a rogue DHCP server attack or other types of DHCP security attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Challenge-Response Authentication Mechanism Message Digest 5 (CRAM-MD5)

A

A common variant of HMAC frequently used in email systems. Like CHAP, CRAM-MD5 only performs one-way authentication (the server authenticates the client).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Terminal Access Controller Access-Control System Plus (TACACS+)

A

A TCP-based protocol used to communicate with an AAA server. Unlike RADIUS, TACACS+ encrypts an entire authentication packet rather than just the password. TACACS+ offers authentication features, but they are not as robust as the accounting features found in RADIUS. Also, unlike RADIUS, TACACS+ is a Cisco-proprietary protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Asymmetric Encryption

A

With asymmetric encryption, the sender and receiver of a packet use different keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 2 Tunneling Protocol (L2TP)

A

A VPN protocol that lacks security features, such as encryption. However, L2TP can still be used for a secure VPN connection if it is combined with another protocol that provides encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lightweight Directory Access Protocol (LDAP)

A

An open standard for storing directory information for the network such as usernames and passwords and other user and computer parameters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symmetric Encryption

A

With symmetric encryption, both the sender and the receiver of a packet use the same key (a shared key) for encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Nessus

A

A network-vulnerability scanner available from Tenable Network Security.

17
Q

Insider Threat

A

In network security, this refers to an attacker who resides inside the network. Often, this might be an employee of the company.

18
Q

Pretty Good Privacy (PGP)

A

PGP is a widely deployed asymmetric encryption algorithm and is often used to encrypt email traffic

19
Q

Security Association (SA)

A

An agreement between the two IPSec peers about the cryptographic parameters to be used in an ISAKMP session.

20
Q

Network-based IPS (NIPS)

A

An NIPS device is a network appliance dedicated to acting as an IPS sensor.

21
Q

Internet Key Exchange (IKE)

A

A protocol used to set up an IPSec session.

22
Q

Encapsulating Security Payload (EPS)

A

An IPSec protocol that provides authentication, integrity, and encryption services.

23
Q

Unified Threat Management (UTM)

A

A firewall or gateway that attempts to bundle multiple security functions into a single physical or logical device.

24
Q

Demilitarized Zone (DMZ)

A

Often contains servers that should be accessible from the Internet. This approach would, for example, allow users on the Internet to initiate an email or a web session coming into an organization’s email or web server. However, other protocols would be blocked.

25
Q

Distributed Denial of Service (DDoS)

A

These attacks can increase the amount of traffic flooded to a target system. Specifically, an attacker compromises multiple systems, and those compromised systems, called zombies, can be instructed by the attacker to simultaneously launch a DDoS attack against a target system.

26
Q

Internet Security Association and Key Management Protocol (ISAKMP)

A

Negotiates parameters for an IPSec session.

27
Q

Evil Twin

A

A device that is postured to appear like a legitimate access point on the network to carry out a wireless attack.

28
Q

Buffer Overflow

A

This attack occurs when an attacker leverages a vulnerability in an application, causing data to be written to a memory area (that is, a buffer) that’s being used by a different application.

29
Q

Point-to-Point Tunneling Protocol (PPTP)

A

An older VPN protocol that supported the dial-up networking feature in older versions of Microsoft Windows. Like L2TP and L2F, PPTP lacks native security features. However, Microsoft’s versions of PPTP bundled with various versions of Microsoft Windows were enhanced to offer security features.

30
Q

Black-hole Router

A

A router that drops packets that cannot be fragmented and are exceeding the MTU size of an interface without notifying the sender.

31
Q

Short

A

A short occurs when two copper connectors touch each other, resulting in current flowing through that short rather than the attached electrical circuit, because the short has lower resistance.

32
Q

Open

A

A broken strand of copper that prevents current from flowing through a circuit.

33
Q

Decibel Loss

A

A loss of signal power. If a transmission’s dB loss is too great, the transmission cannot be properly interpreted by the intended recipient.

34
Q

What describes an IPv6 address of ::1?

A

Loopback address

35
Q

What is RAS?

A

A remote access server is a type of server that provides a suite of services to remotely connect users to a network or the Internet.