perimeter defense Flashcards
a buffer network that sits between a private network and a untrusted network
DMZ
any host that is exposed to attack and has been hardened against those attacks.
bastion or sacrificial host
a router that uses ACL;s to do packet filtering is called
screening router
a firewall that has 3 network interfaces connected to it; one connected to the Internet, one connected to the public subnet, and one connected to the private network
dual homed gateway
a router that resides within the DMZ and requires users to authenticate access to resources within the DMZ
screed host gateway
the process of copying records from the primary to the secondary DNS serer is called
zone transfer (in clear text)
it is used to perform direct queries on DNS server
nslookup
this occurs when a name server receives malicious data that incorrectly maps host name and ip address
DNS poisoning
this occurs when spammers exploit domain registration by taking advantage of the 5 day grace period for newly registered domain name.
domain name kitting
which windows file, maps IP address to host names
Windows/System32/drivers/etc
attacks that impacts the system availability by flooding it with traffic or request by exploiting a system or software flow
denial of service (DoS)
a simple DoS attack that overwhelms the victim with ICMP packets
ping flood
a DoS attack that uses the ping program to send oversized ICMP packet
ping of death
is a form of Distributed Reflective DoS attack that spoofs the source address in ICMP packets
Smurf
this DoS TCP attack exploits the TCP three-way handshake
SNY flood
this DoS TCP attack is one in which the attacker floods the victim’s system with packets that have forged headers
LAND
this DoS TCP attack uses an IP address with every option truned on.on for the protocol being used.
Xmas tree
the DoS UDP attack sends larges amount of UDP packets directly to the broadcast address aimed at port 7 and 19 with spoofed sources address
fraggle
this DoS UDP attack manipulates UDP fragments number and location
teardrop
this IPSec mode is used for end-to end data encryption
transport mode
_____ attack occurs when stolen DNS records are used to redirect traffic to fake Web sites for malicious purposes
DNS based
a DNS server configured with one primary DNS server that maintains a read/write copy of all the computer names and IP addresses registered in DNS for the domain is called
standard DNS
a DNS servers that obtain a read only copy of this data from the primary DNS server is called
secondary DNS
The process of copying the records from the primary to the secondary DNS server is called
zone transfer done in clear text
in a ______ DoS attack, multiple PCs attack a victim simultaneously.
Distributed
in a Distributed DOS, the attacker identifies one of the computers as the
master
the master uses ____ to attack
zombies/bots
_____ DoD uses an amplification network to increase the severity of the attack.
Distributed Reflective