perimeter defense Flashcards
a buffer network that sits between a private network and a untrusted network
DMZ
any host that is exposed to attack and has been hardened against those attacks.
bastion or sacrificial host
a router that uses ACL;s to do packet filtering is called
screening router
a firewall that has 3 network interfaces connected to it; one connected to the Internet, one connected to the public subnet, and one connected to the private network
dual homed gateway
a router that resides within the DMZ and requires users to authenticate access to resources within the DMZ
screed host gateway
the process of copying records from the primary to the secondary DNS serer is called
zone transfer (in clear text)
it is used to perform direct queries on DNS server
nslookup
this occurs when a name server receives malicious data that incorrectly maps host name and ip address
DNS poisoning
this occurs when spammers exploit domain registration by taking advantage of the 5 day grace period for newly registered domain name.
domain name kitting
which windows file, maps IP address to host names
Windows/System32/drivers/etc
attacks that impacts the system availability by flooding it with traffic or request by exploiting a system or software flow
denial of service (DoS)
a simple DoS attack that overwhelms the victim with ICMP packets
ping flood
a DoS attack that uses the ping program to send oversized ICMP packet
ping of death
is a form of Distributed Reflective DoS attack that spoofs the source address in ICMP packets
Smurf
this DoS TCP attack exploits the TCP three-way handshake
SNY flood