perimeter defense Flashcards

1
Q

a buffer network that sits between a private network and a untrusted network

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

any host that is exposed to attack and has been hardened against those attacks.

A

bastion or sacrificial host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a router that uses ACL;s to do packet filtering is called

A

screening router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a firewall that has 3 network interfaces connected to it; one connected to the Internet, one connected to the public subnet, and one connected to the private network

A

dual homed gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a router that resides within the DMZ and requires users to authenticate access to resources within the DMZ

A

screed host gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the process of copying records from the primary to the secondary DNS serer is called

A

zone transfer (in clear text)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

it is used to perform direct queries on DNS server

A

nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this occurs when a name server receives malicious data that incorrectly maps host name and ip address

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this occurs when spammers exploit domain registration by taking advantage of the 5 day grace period for newly registered domain name.

A

domain name kitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which windows file, maps IP address to host names

A

Windows/System32/drivers/etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attacks that impacts the system availability by flooding it with traffic or request by exploiting a system or software flow

A

denial of service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a simple DoS attack that overwhelms the victim with ICMP packets

A

ping flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a DoS attack that uses the ping program to send oversized ICMP packet

A

ping of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

is a form of Distributed Reflective DoS attack that spoofs the source address in ICMP packets

A

Smurf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

this DoS TCP attack exploits the TCP three-way handshake

A

SNY flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

this DoS TCP attack is one in which the attacker floods the victim’s system with packets that have forged headers

A

LAND

17
Q

this DoS TCP attack uses an IP address with every option truned on.on for the protocol being used.

A

Xmas tree

18
Q

the DoS UDP attack sends larges amount of UDP packets directly to the broadcast address aimed at port 7 and 19 with spoofed sources address

A

fraggle

19
Q

this DoS UDP attack manipulates UDP fragments number and location

A

teardrop

20
Q

this IPSec mode is used for end-to end data encryption

A

transport mode

21
Q

_____ attack occurs when stolen DNS records are used to redirect traffic to fake Web sites for malicious purposes

A

DNS based

22
Q

a DNS server configured with one primary DNS server that maintains a read/write copy of all the computer names and IP addresses registered in DNS for the domain is called

A

standard DNS

23
Q

a DNS servers that obtain a read only copy of this data from the primary DNS server is called

A

secondary DNS

24
Q

The process of copying the records from the primary to the secondary DNS server is called

A

zone transfer done in clear text

25
Q

in a ______ DoS attack, multiple PCs attack a victim simultaneously.

A

Distributed

26
Q

in a Distributed DOS, the attacker identifies one of the computers as the

A

master

27
Q

the master uses ____ to attack

A

zombies/bots

28
Q

_____ DoD uses an amplification network to increase the severity of the attack.

A

Distributed Reflective