Network Scanners Flashcards
What 5 tools come under the term network scanners?
1) packet sniffers
2) IPS/IDS devices
3) Port scanners
4) wi-fi analyzers
5) Bandwidth speedtesters
What type of network scanner allows you to capture traffic on a segment, to identify router/switch interfaces (interface monitoring) and identify sources of broadcast storms?
packet sniffer
Snort is a popular type of what product? Why
IDS/IPS. It runs on both Windows and Linux and it’s free
What is an Adaptive Security Appliance (ASA)?
Cisco’s enterprise IDS/IPS solution
Within Snort, what displays and reports intrusions and attacks logged in the Snort database?
The Basic Analysis and Security Engine (BASE)
What security devices should typically placed between the internal router and the DMZ firewall?
IPS/IDS
What is the differences between a port scan and a port sweep?
1) Port scan scans for TCP/UDP open ports on a single target host
2) Port sweep scans multiple hosts. Typically used to identify SQL for injection attacks
what happens in half-open scanning?>
a syn packet is sent to listen for a syn-ack reply telling the querying host that the port is open. The scanner closes the connection with a RST (reset) packet
name two port scanning software
Angry IP and Nmap (Nmap available on both Windows and Unix)
What are the 4 ways in which wi-fi analyzers work?
1) passively collect packets
2) detect standard named networks
3) detect hidden networks
4) infer the presence of nonbeaconing networks via data traffic
What tool is used to perform end-user experience measures and also locates sources of RF interference so improvements to the wireless network can be implemented?
wireless survey tool with spectrum analyzer
what can you use to certify the wireless network for design/application requirements?
Using pass/fail assessment reports based on wireless survey tool output
When baselining the network, what 3 things do you need to ensure are verified for future network admins to follow?
1) the network confirms to all regulations
2) clear management procedures
3) clear security policies
What are the 4 key baseline components?
1) processor utilization
2) memory utilization
3) hard-disk utilization
4) wired/wireless utilization
On what two occasions should baselining be redone?
1) one a year
2) after major upgrades to network infra