Network Security Flashcards
Access Control Entry (ACE)
An individual rule found within an Access Control List (ACL).
Access Control List (ACL)
A set of rules that define how to allow or deny traffic at the router interface, based on specific criteria. ACLs can also be used to match traffic for classification and QoS purposes.
Amplified Denial of Service (DoS) Attack
A type of DoS attack where an attacker exploits weaknesses in domain name system (DNS) servers in order to send a large amount of DNS record information to a target system.
ARP Poisoning
A tactic used in man-in-the-middle attacks where a threat actor sends gratuitous ARP replies to a client system, in an attempt to convince the client system to send frames destined for its default gateway to the attacker’s computer instead.
Brute Force
An attack where a series of consecutive strings (referred to as a dictionary) are used in an attempt to find a password or key.
What is a deauthentication attack
An attack where a malicious user sends a deauthentication frame along with a spoofed IP address to a wireless access point, which causes a legitimate user to be dropped form the wireless network and forced over to a rogue access point instead.
Denial of Service (DoS) Attack
An attack where a targeted system is overwhelmed with a large volume of requests, causing it to consume resources to the point where it can’t perform its intended function.
DHCP Snooping
A Layer 2 security feature that is used to detect and drop traffic from unauthorized DHCP servers on a network.
DHCP Spoofing Attack
An attack where a malicious user has a rogue DHCP server that responds to DHCP Discover messages sent from a legitimate DHCP client.
Distributed Denial of Service Attack (DoS)
A type of DoS attack where multiple compromised systems are used together in order to attack a target system.
DNS Poisoning
When an attacker advertises incorrect domain name resolution information into a DNS server, causing DNS requests to resolve to a compromised system instead of a legitimate one.
Dynamic ARP Inspection (DAI)
A security feature that rejects invalid and malicious ARP packets, preventing circumstances such as Man-in-the-Middle attacks.
Evil Twin
A rogue access point appearing to be a legitimate wireless access point.
Extended Access Control List (ACL)
A type of ACL that provides greater control over traffic than a standard ACL by allowing traffic prioritization based on source and destination IP address, source and destination port, or protocol ID. These types of ACLs should be placed as close to the destination as possible. 100-199, 2000-2699
Insider Threat
A security risk that originates from within the organization itself, such as current or former employees.