Network Forensics Flashcards

1
Q

Allows for the copying of ingress and/or egress communications from one or more switch ports to another

A

Switched Port Analyzer (SPAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A piece of hardware or software that records data from frames as they pass over network media using methods such as a mirrored port or tap device

A

Packet Sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A data-network packet analyzer computer program that runs under a command line interface and allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached

A

tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A free and open-source GUI-based packet analyzer that is used for network troubleshooting, analysis, software and communications protocol development, and education

A

Wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Captures the entire packet including the header and the payload for all traffic entering and leaving a network

A

Full Packet Capture (FPC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A means of recording metadata and statistics about network traffic rather than recording each frame

A

Flow Collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Cisco-developed means of reporting network flow information to a
structured database

A

NetFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A hybrid tool that passive monitors a network like a sniffer and only
logs data of potential interest

A

Zeek (Bro)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A tool used to create graphs showing traffic flows through the network
interfaces of routers and switches by polling the appliances using the
Simple Network Management Protocol (SNMP)

A

Multi Router Traffic Grapher (MRTG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An IP address or range of addresses that appears on one or more blacklists
Reputation-based risk intelligence is used to create IP/URL blacklists

A

Known-bad IP Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A method used by malware to evade blacklists by generating domain names for
C&C networks dynamically

A

Domain Generation Algorithm (DGA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A method used by malware to hide the presence of C&C networks by continually changing the host IP addresses in domain records using domain generation algorithms

A

Fast Flux Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Activity that is performed to identify whether a link is already flagged on an existing reputation list, and if not, to identify what malicious script or activity might be coded within it

A

URL Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A set of request methods to indicate the desired action to be performed for a given resource

A

HTTP Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The principle method used with HTTP and is used to retrieve a resource

A

GET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used to send data to the server for processing by the requested resource

A

POST

17
Q

Creates or replaces the requested resource

A

PUT

18
Q

Used to remove the requested resource

A

DELETE

19
Q

Retrieves the headers for a resource only and ignores the body

A

HEAD

20
Q
  • Indicates a successful GET or POST request (OK)
A

200

21
Q

Indicates where a PUT request has succeeded in creating a resource

A

201

22
Q

Any code in this range indicates that a redirect has occurred by the server

A

3xx

23
Q

Any code in this range indicates an error in the client request

A

4xx

24
Q

Indicates that a request could not be parsed by the server

A

400

25
Q

Indicates that a request did not supply authentication credentials

A

401

26
Q

Indicates that a request did not have sufficient permissions

A

403

27
Q

Indicates that a request did not have sufficient permissions

A

404

28
Q

Any code in this range indicates a server-side issue

A

5xx

29
Q

Indicates a general error on the server-side of the application

A

500

30
Q

Indicates a bad gateway has occurred when the server is acting as a proxy

A

502

31
Q

Indicates an overloading of the server is causing service unavailability

A

503

32
Q

Indicates a gateway timeout means an issue with the upstream server

A

504

33
Q

A mechanism to encode 8-bit characters that have specific meaning in the context of URLs, also known as URL encoding

A

Percent Encoding