Overall Flashcards
Trivial File Transfer Protocol (TFTP) port
Port 69
File Transfer Protol (FTP) port
Port 20/21
Network Time Protocol (NTP) port
Port 123
Simple Mail Transfer Protocol (SMTP) port
Port 25
Simple Network Management Protocol (SNMP) v3
Uses UDP port 161, 162
Remote Desktop Protocol (RDP)
UDP/TCP port 3389
File Transfer Protocol Secure or SSL (FTP/S) port
Port 989, 990
SSH or Secure File Transfer Protocol (S/FTP) port
Port 22
Terminal Access Controller Access Control System (TACACS) port
Port 49
Kerberos port
Port 88
Microsoft SQL Server port
1433
Lightweight Directory Access Protocol (LDAP)
port 389 (TCP/UDP)
Lighweight Directory Access Protocol SSL (LDAP/S) port
Port 636
HTTP port
port 80
HTTPS port
Port 443 (uses SSL/TLS)
Telnet port
port 23
SSH port
port 22
NetBIOS port
ports 137-139
Secure Copy Protocol (SCP) port
Port 22 (uses SSH)
Post Office Protocol (POP) port
port 110
A user notifies you that a software application displays advertisements while the application is executing. Of which security threat is this an example?
ADWARE- software application that displays advertisments while the application is executing.
A tunneling protocol that provides secure authentication and data encryption.
IPSEC (Internet Protocol Security)
A network management protocol that allows communications between network devices and management console.
SNMP (Simple Network Management Protocol)
A File transfer protocol that uses SSH for security
SFTP (SSH or Secure File Transfer Protocol)
A file transfer protocol that uses SSL for security
FTPS (File Transfer Protocol Secure/SSL)
Software that requires that your activites be monitored and tracked. Collect cookies and report on a users activities.
Spyware
A program that spreads itself through network connection.
WORM
Which condition might indicate that a hacker is hacking a network?
A MAJOR INCREASE IN ICMP TRAFFIC
*Hacking a network with a ping of death ‘Denial-of-Service’ (DOS) attack
What network devices can you use to connect two or more of the LANsegments together without collisions?
Bride, router and switches, connect LAN segments.
Whichevents should be considered as part of the business continuity plan?
Natural, disaster, hardware and failure
What would include ISO compliance, adhereing to NIST and Payment Card Industry DataSecurity Standard (PCI-DSS). “General” stating a wide range of standards covered.
General-Purpose-Guides
_______ is a key distrubution protocol & distribution protocol used for secure IP communications, such as IPSEC (Internet Protocol Security).
SKIP (Simple Key Management Protocol for Internet Protocols)
________ involves accepting the risk and leaving the security plan the same.
Acceptance
________ involves modifying the security plan to eliminate the risk or its impact.
Avoidance
________ involves transferring the risk and it’s consequiences to a third party.
Transference
________ involves reducing the probability or impact of a risk (taking action to minimize probability.
Mitigation
What can hide itself from antivirus software by distorting its own code. When spreading, it jumbles and garbles it’s own code to prevent antivirus software from detecting its presence.
self-garbling virus
What hides the changes it makes to the system files and boot records, making it difficult to detect its presence. Maintains a copy of a file before infecting it and presents the orginal copy to the monitoring sofware so that no changes are detected by the system.
Stealh virus
Virus progreams written in Word Basic, visual Basic and VBScript. Platfor independent, typically infects systems through microsoft office products.
macro virus
What detects data or files that are hidden within other files?
Steganagraphy tools
What tools are used to ensure that information is completely removed from a device beore it is descarded, sold or recycled.
Data Sanitization tools
What tools are used by a network administrator to test the security of a network, such as penetration test (metasploit).
Exploitation Frameworks
__________ is the general term for tools that help you locate weaknesses in your network before they are exploited by an attacker
Vulnerability Scanner
A password, PIN, name of a childhood friend, color of first car, similar questions are examples of which authentication?
Something You Know
Fingerprints, voice prints, retina scan & Iris scans and biometrics are examples of which authentication?
Something You Are
Under _________, a set of organizational roles are defined and users are allocated to those roles. Under this system, the right to modifiy roles is reserved to admin accounts. The system is non-discretionary, as each user has no right to modify the ACL of a resooure, even though they can change the resoure in other ways.
Role-based Access Control (RBAC)
The owner is originally the creator of the resource, though ownership can be assigned to another user. The owner is granted FULL control over the resource, meaning the owner can modify it’s ACL to grant rights to others.
Discretionary Access Control (DAC)
_______ & _______ attacks target virtual machines. These attacks attempt to detect virtual servers and machines on a network. Once the virtual machines are identified, various techniques are used to attack the VM’s to breach the hos and eventually the netwrok.
Red Pill & Scooby Doo attacks
DES uses ______ encryption keys.
56-bit encryption keys
AES uses _____, _____, and ____ bit encryption keys.
128, 192 and 256 bit encryption keys.
MD5 produces _________ checksums
128-bit checksums
What produces 256-bit checksums?
SHA-256 aka SHA-2
___________ produces 160-bit checksums
SHA-1 (Secure Hashing Algorithm)
___________ - means identifying the risk and no longer engaging the activities associated with that risk. Example; no longer accept credit card information via email.
Risk Avoidance
______ uses a combination of conventional symmetric-key cryptography for speed and public-key cryptography for ease of secure key exchange. It supports the following algorithms: RSA, DSA, cipher, IDEA, 3DES, CAST5, Blowfish, AES-128/192/256, CAMELLIA, HASH: MD5, SHA-1, SHA-265, 384,/512/224, RIPEND-160. Is an alternative to the PGP suite of cryptographic software.
GNU Privacy Guard (GPG)