Network+ Extra 3 Flashcards

1
Q

An SNMP ___ message retrieves information from a managed device.

A

Get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An SNMP ___ message ____ a variable in a managed device or triggers an action on a managed device.

A

Set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The noAuthNoPriv (no authorization, no privacy) security level uses community strings for authorization and does not use encryption to provide privacy.

A

noAuthNoPriv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The authNoPriv (authorization, no privacy) security level provides authorization using hashed message authentication code (HMAC) with Message Digest 5 (MD5) or Secure Hash Algorithm (SHA). However, no encryption is used.

A

authNoPriv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The authPriv (authorization, privacy) security level offers HMAC MD5 or SHA authentication and provides privacy through encryption. Specifically, the encryption uses the Cipher Block Chaining (CBC) Data Encryption Standard (DES) (DES-56) algorithm.

A

authPriv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Many management systems provide a secured web connection using SSL/TLS security via a web browser.

A

HTTPS/management URL :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An example of using an overt channel is tunneling one protocol inside another (for example, sending instant-messaging traffic via HTTP). Steganography is another example of sending information over an overt channel. An example of steganography is sending a digital image made up of millions of pixels with “secret” information encoded in specific pixels, where only the sender and the receiver know which pixels represent the encoded information.

A

Sending info over overt channels :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

different devices have trust with others if attackers can for example could compromise the host which is linked to the firewall then the attacker could bypass the firewall.

A

Trust Relationship Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attacker could hijack a TCP session, for example, by completing the third step in the three-way TCP handshake process between an authorized client and a protected server. If an attacker successfully hijacked a session of an authorized device, he might be able to maliciously manipulate data on the protected server.

A

Hijacking a session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

With this attack, a third-party system is used to help carry out the attack; oftentimes this third party is not compromised, making this attack very difficult to track down.

A

(DoS) Reflective:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly