Protecting Your Network Flashcards

1
Q

when an attacker targets a DNS server with a bad one, sending spoofed DNS info, which will be cached and spread to other devices

A

DNS cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

extensions added for domain name resolution to prevent DNS cache poisoning, used by all the DNS root and top-level domains

A

Domain Name System Security Extensions (DNSSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

whenever one does something with a protocol that it was never meant to do and results in a threat

A

protocol abuse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the insertion of unwanted information into a packet using special software with the aim of breaking another system

A

malformed packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the way and attack takes advantage of a vulnerability

A

attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the process of attacking the ARP caches on hosts and switches, such as by sending false information

A

ARP cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cisco technology for avoiding ARP cache poisoning by keeping track of known good IP addresses and MAC addresses, in switches

A

Dynamic ARP Inispection (DAI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

technology that creates a list of MAC addresses for known DHCP servers and clients, used to prevent someone unknown (MAC address) sending DHCP server messages; sends an alarm to the appropriate person

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a key network hardening technique, enchanced by adding DAI or DHCP snooping

A

switch port protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

single computer under the control of an operator in a DDoS attack

A

zombie/bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a group of computers under the control of an operator in a DDoS atatck

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

attack that sends a large amount of packets to a server with that server’s IP address set as the source

A

reflection/reflective DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

form of DoS attack with the aim of kicking a client off of its WAP; a rogue AP nearaby acts as an alternative

A

deauthentication (deauth) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DoS attack lacking any malice from the attacker, such as when a site/server cannot handle the legitimate load it is under

A

friendly/unintentional DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

unintentional DoS attack where a popular sites references a smaller site, resulting in a massive amount of traffice to that smaller site

A

slashdotting/Reddit hug of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attack where the culprit tries to intercept a valid computer session to get authentication data

A

session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the addition of redundancy to a system to prevent loss?

A

fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

an attack where a malicious user probes an open port to gain information about the running services

A

banner grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

attack that takes a system connected to one VLAN and use switch commands to change the switch port connection to a trunk link

A

VLAN hopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

list on many devices that defines what a user can do with that device’s shared resources

A

access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

attack that uses encryption to lock a user out of a system, such as encrypting the hard drive; usually used to force users to pay money to get the device decrypted - crypto-ransomware

A

crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

program (not stand-alone) that is designed to replicate and activate (by user action); often replicates as code added to boot sector or extra code added to the end of executables; only replicates to other applications on a drive or to other drives; needs a host file to infect

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

program that replicates exclusively through a network, replicating itself to any computer it sees on the network; can exploit vulnerabilities in program code, attack program code, programs, OS’s, protocols, etc.; does not need host files to infect

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

virus that uses application macros to replicate and activate

A

macro (virus)

25
Q

code that is written to execute when certain conditions are met, usually malicious

A

logic bomb

26
Q

malware that pretends to be one things while instead doing something bad; can be used to capture keystrokes, files, credit card info, etc.

A

trojan horse

27
Q

malware that takes advantage of low-level operating system functions to hide itself; it also gains privileged access to the computer; attacks OS’s, hypervisors, and even firmware

A

rootkit

28
Q

a program that monitors the sites you visit to send you advertisements, usually via pop-up windows; the ads can install viruses or contain sypware

A

adware

29
Q

process of manipulating the people inside the organization to gain access to the network; includes spam calls and pretending to be someone legit to get information or examine workstations

A

social engineering

30
Q

social engineering attack where the attacker poses as a legit site, requesting that a person update their information (like financial info)

A

phishing

31
Q

the accidental spilling of radio waves outside of their intended area, where people can intercept them; address this by adding filtering between the system and where malicious people might try to access it

A

RF emanation

32
Q

series of standards for addressing RF emanation, found in US Government agencies

A

TEMPEST

33
Q

feature of many chassis, including all modern servers, that records onto NVRAM when the chassis was opened; more basic items like stickers or zip ties can create this feature

A

tamper detection

34
Q

small device, as might be used to open a car, that contains RFID circuitry to open doors

A

key fob

35
Q

unlocking system that consists of a latch, door handle, and series of mechanical push buttons, where a person must press the buttons in a certain pattern to gain entry; turning the handle open the latch if the pattern is correct or clears the entry

A

cipher lock

36
Q

self-contained, closed system in which camera feeds go to specific dedicated monitors and storage devices

A

closed-circuit televisions (CCTV)

37
Q

approach to network security where each user has a single user account and they only have permission to access the resources they need for the job; the most common approach to network security

A

principle of least privilege

38
Q

the combined permissions for a user that is a part of multiple groups; Deny always trumps other permissions

A

effective permissions

39
Q

piece of hardware optimized to perform a certain task; multiple of these work in conjuection with a central controller rather than have one controller do everything

A

edge device

40
Q

standardized approach to network security in which devices much meet a certain criteria before being allowed to connect to a network

A

network access control (NAC)

41
Q

tools used by Cisco to implement NAC; a switch or router which this enabled will query devices (the agent program on the device containing node info, resources, assets) to make sure they meet certain criteria, such as anti-malware, QoS, OS version; if they pass, the device connects to the network; if a node does not pass, it either doesn’t connect or is connected to a different network until it reaches the criteria

A

posture assessment

42
Q

program that runs every time the host boots up, storing system information for posture assessment querying

A

persistent agent

43
Q

program that runs whenever a client needs to connect to a secure network through a web portal; the program only checks those components that will reach the criteria of the posture assessment

A

non-persistent agent

44
Q

Cisco program, process, or server that is responsible for admitting or denying a connection for a node to a network; it directs an edge device to deny or allow

A

Access Control Server (ACS)

45
Q

excessive or malformed packets sent by attackers to a network/switch (DoS attack)

A

traffic flood

46
Q

employed by modern switches to detect and block excess traffic, enhancing switch port protection

A

flood guard

47
Q

system with a very high network output, likely the result of malware

A

top talker

48
Q

capability of some anti-malware programs to passively monitor a computer’s activities and check for malware only at certain events, like downloading a file or executing a program

A

virus shield

49
Q

anti-malware setup where a single server runs on a number of systems (systems may have a small client); easier to update and administer, and responsibility falls to the provider

A

network-based anti-malware

50
Q

anti-malware program that is stored on a server in a remote location; nothing is stored on the host, but the host is responsible for accessing the software

A

cloud/server-based anti-malware

51
Q

capability in a firewall to tell if a packet is part of an existing connection

A

stateful inspection

52
Q

firewall capability where the firewall looks at each packet fresh with no regard for the state of the packet’s relation to another packet

A

stateless inspection

53
Q

capability of firewalls to filter based on the application or service that originated the packet; operates at OSI layer 7

A

application/context aware

54
Q

the marriage of firewalls with other security services, such as network-based IPS, load balancing, etc.

A

unified threat management (UTM)

55
Q

organized, ongoing attack against the same entity

A

advanced persistent threats (APTs)

56
Q

a feature the enables networks to block access to certain Web sites; for firewalls and others advanced networking devices

A

web filtering

57
Q

a networking features that enables the network to block traffic based on specific signatures or keywords (like profane language)

A

content filtering

58
Q

any machine that is fully exposed to the Internet, like a firewall

A

bastion host

59
Q

a machine, program, or VM that acts as a decoy within a network for the purpose of attracting attention to hackers and wasting their time and resources; can also monitor and reports on any attacks; must be segmented from trusted network

A

honeypot