Network Scanners Flashcards

1
Q

What 5 tools come under the term network scanners?

A

1) packet sniffers
2) IPS/IDS devices
3) Port scanners
4) wi-fi analyzers
5) Bandwidth speedtesters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of network scanner allows you to capture traffic on a segment, to identify router/switch interfaces (interface monitoring) and identify sources of broadcast storms?

A

packet sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Snort is a popular type of what product? Why

A

IDS/IPS. It runs on both Windows and Linux and it’s free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Adaptive Security Appliance (ASA)?

A

Cisco’s enterprise IDS/IPS solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Within Snort, what displays and reports intrusions and attacks logged in the Snort database?

A

The Basic Analysis and Security Engine (BASE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What security devices should typically placed between the internal router and the DMZ firewall?

A

IPS/IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the differences between a port scan and a port sweep?

A

1) Port scan scans for TCP/UDP open ports on a single target host
2) Port sweep scans multiple hosts. Typically used to identify SQL for injection attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what happens in half-open scanning?>

A

a syn packet is sent to listen for a syn-ack reply telling the querying host that the port is open. The scanner closes the connection with a RST (reset) packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

name two port scanning software

A

Angry IP and Nmap (Nmap available on both Windows and Unix)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 4 ways in which wi-fi analyzers work?

A

1) passively collect packets
2) detect standard named networks
3) detect hidden networks
4) infer the presence of nonbeaconing networks via data traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What tool is used to perform end-user experience measures and also locates sources of RF interference so improvements to the wireless network can be implemented?

A

wireless survey tool with spectrum analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what can you use to certify the wireless network for design/application requirements?

A

Using pass/fail assessment reports based on wireless survey tool output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When baselining the network, what 3 things do you need to ensure are verified for future network admins to follow?

A

1) the network confirms to all regulations
2) clear management procedures
3) clear security policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the 4 key baseline components?

A

1) processor utilization
2) memory utilization
3) hard-disk utilization
4) wired/wireless utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

On what two occasions should baselining be redone?

A

1) one a year

2) after major upgrades to network infra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which vulnerability scanner works across all devices and operating systems?

A

Nessus

17
Q

Why must you be careful when using Nessus?

A

It simulates a network attack and can crash operating systems.

18
Q

Wire shark can decode data from layer 2, layer 3, layer 4 and layer 7 and even reproduce voice streams from VoiP calls - TRUE or FALSE?

A

TRUE

19
Q

OpenNMS, Nagios and PRTG Network Monitor are examples of what type of application?

A

Automated network event management and alerting systems.

20
Q

OSSIM by AlienVault is an example of what type of application?

A

Network Security Information and Event Management tool (SIEM).

21
Q

Port scanning works at what OSI layer?

A

Transport layer. Ports can be thought of as transport layer addresses used to send messages to an application!

22
Q

List two protocol analyzers that also provide packet sniffing capabilities

A

Wireshark and MS Message Analyzer