Network Security & Infrastructure Flashcards
Net+ N10-009
ARP Spoofing
Occurs when an attacker sends falsified ARP messages, linking their MAC address with a legitimate IP
ARP Poisoning
Corrupts ARP cache by associating attacker’s MAC with IP addresses of LAN devices
DNS Poisoning
When fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website
Double Tagging
A method where the attacker tries to reach a different VLAN using vulnerabilities in the trunk port configuration
Switch Spoofing
Occurs when an attacker attempts to use the Dynamic Trunking Protocol (DTP) to negotiate a trunk port with a switch
On-Path Attack
An attack where the penetration tester places their workstation between two hosts to capture, monitor, and relay communications
Rogue Devices
Unauthorized devices or services on a network that allows unauthorized individuals to connect to that network
Replay Attack
Occurs when an attacker captures valid data and repeats it either immediately or with a delay
SSL Stripping
Redirecting HTTPS requests to HTTP to capture unencrypted data
Relay Attack
Attacker becomes a proxy between two hosts, intercepting and potentially modifying communications
Network Taps
Physical device that is attached to cabling to record packets passing over the network segment
Discretionary Access Control (DAC)
Access control method where owners of resources determine access permissions
Mandatory Access Control (MAC)
Access control policy where the computer system determines access
Need-to-Know Principle
Users must have both the necessary clearance level and a need to know to access information
Power Users
A user group with permissions between regular users and administrators
Role-Based Access Control (RBAC)
Access control model based on defining roles for job functions
Role-Based Groups
-Grouping users based on their job functions
-Assigning permissions to groups rather than individual users
SAML (Security Assertion Markup Language)
Exchanging authentication and authorization data between an identity provider and a service provider, enabling single sign-on (SSO) for users across different applications.
Diffie-Hellman Key Exchange
Allows two systems that do not know each other to be able to exchange keys and trust each other
Transport Mode
-Uses original IP header
-Suitable for client-to-site VPNs
Kerberos
Uses secret-key cryptography and a trusted third party to provide secure, mutual authentication between clients and servers over an insecure network.
Authentication Header (AH)
Provides data integrity and origin authentication, but not confidentiality
Tunneling Mode
-Encapsulates the entire packet
-Suitable for site-to-site VPNs
Encapsulating Security Payload (ESP)
Provides authentication, integrity, replay protection, and confidentiality of the data
Wildcard Certificate
Allows multiple subdomains to use the same public key certificate
Single-Sided Certificate
-Authenticates only the server to the user
-Requires no certificate from the user
Dual-Sided Certificate
-Requires both server and user to validate each other using certificates
-Offers higher security but requiring more processing power
Root of Trust
Validates certificates in a chain from a trusted root certificate authority, ensuring trustworthiness
Certificate Authority (CA)
-Issues digital certificates
-Contains CA details, serial number, issue/expiry dates, and version
Registration Authority (RA)
Certificate Revocation List (CRL)
Certificate Signing Request (CSR)
Key Recovery Agents
Key Escrow Agents
Packet Filtering Firewall
Stateful Firewall
Stateless Firewall
Next-Generation Firewall (NGFW)
Trusted Zone
Unified Threat Management (UTM) System