quiz 2 Flashcards
Denial-of-service (DoS) attack
an attack against a network resource that aims to prevent, disrupt, or delay authorized users from accessing the network resource
Distributed Denial-of-Service (DDoS) attack
a DoS attack that is simultaneously launched from multiple systems.
Network-based DDoS attack
a DDoS attack that aims to exhaust the target system’s network bandwidth
Protocol-based DDoS attack
a DDoS attack that aims to exhaust the target system’s network resources or the resources of a network infrastructure equipment, such as a firewall or a load balancer. Exploits the weaknesses of network layer (OSI layer 3) and transport layer (OSI layer 4) protocols to create maliciously configured protocol packets.
Application layer DDoS attack
a DDoS attack that aims to exhaust specific functions or features of a program.
Domain name system (DNS)
a hierarchical and decentralized naming system for identifying and locating the resources connected to a network.
DNS resolution
process of translating or resolving a domain name to an IP address
DNS zone
a portion of a DNS namespace that is managed by an administrator or specific organization.
authoritative name server
a DNS server that manages a domain’s configuration, also known as the domain’s DNS record.
Domain reputation
a measure of a domain’s trustworthiness based on historical data on the domain.
Domain hijacking
the act of changing the registration information of a domain without the knowledge or consent of the domain owner.
URL redirection
the act of using a URL to divert a user to a malicious website
DNS poisoning
an attack that aims to redirect a user to a malicious website by modifying the user’s DNS query
Data origin authentication
A DNS client is assured that DNS data originated from the zone owner.
Domain Name System Security Extensions
a set of extensions to DNS that provide a DNS resolver cryptographic authentication of DNS data using digital signatures
Data integrity
A DNS client is assured that DNS data has not been modified in transit.
data link layer
facilitates data transfer between two connected devices on the same network. responsible for flow control and the detection and correction of errors that may occur in the physical layer
media access control (MAC) address
a unique 48-bit identifier assigned to a network device
address resolution protocol (ARP)
a protocol used for resolving an internet address (Layer 3) into a MAC address (Layer 2)
ARP cache table
a table that maps an internet address to the internet address’ corresponding MAC address.
Address resolution protocol (ARP) poisoning
an attack in which an attacker sends spoofed ARP messages on a local area network (LAN) to associate the attacker’s MAC address with the IP address of a target host on the LAN
Media access control (MAC) flooding
an attack in which a large number of invalid MAC addresses are sent to a network switch with the aim of overwriting the switch’s MAC table.
MAC cloning
the act of changing the factory-assigned MAC address of a network device
Man-In-The-Middle (MITM) attack
an attack in which an attacker eavesdrops or modifies the communications between two parties. operates at the network layer (Layer 3)
MAC table
a table that maps each network device’s MAC address to a physical port on a switch
Unicast flooding
a switch’s broadcast of a packet on all the switch’s ports. Unicast flooding enables an attacker to gain access to all data packets on a LAN.
secure channel
a communication channel that guarantees data authenticity and data confidentiality.
Man-In-The-Browser (MITB) attack
a type of MITM attack that uses malware to intercept or modify messages exchanged between a web browser and a web server.most often used to steal financial information by modifying a user’s communications with an Internet banking website.
POPS
uses SSL/TLS to secure communications between a POP client and a POP server.
Post office protocol (POP)
an Internet standard protocol used by an email client to retrieve an email from a mail server. does not support the sending of an email
Internet message access protocol (IMAP)
an Internet standard protocol used by an email client to retrieve an email from a mail server.
IMAPS
uses SSL/TLS to secure communications between an IMAP client and an IMAP server.
Multipurpose Internet Mail Extensions (MIME)
an Internet standard that extends the format of an email message to support non-ASCII character sets and multimedia attachments
Secure/Multipurpose Internet Mail Extensions (S/MIME)
an Internet standard for signing and encrypting MIME data.
Secure shell protocol (SSH)
a cryptographic network protocol for securely operating a network service over an insecure network.
Protocol tunneling
the encapsulation of a protocol’s packets within the packets of another protocol.
FTPS
an extension to the file transfer protocol (FTP) that uses SSL/TLS to provide communication security.
SSH file transfer protocol (SFTP)
an extension of the SSH protocol that enables secure file transfer capabilities between networked hosts
Secure real-time transport protocol (SRTP)
a protocol for secure delivery of voice and video services over an IP network.
Lightweight directory access protocol (LDAP)
a protocol for accessing and maintaining distributed directory information services over an IP network
LDAPS
uses SSL/TLS to protect LDAP transmissions
LDAP injection attack
an attack in which an attacker exploits input validation vulnerabilities to construct and execute an unauthorized LDAP query
Hypertext transfer protocol secure (HTTPS)
an extension of the hypertext transfer protocol (HTTP) that uses SSL/TLS to establish an authenticated and encrypted connection between a client and a server.
Internet Protocol Security (IPSec)
a protocol suite for securing data communications over an IP network.
Authentication Header (AH)
an IPSec protocol that provides authentication and integrity for an IP packet and protection against a replay attack
Encapsulating Security Protocol (ESP)
an IPSec protocol that provides authentication, integrity, and confidentiality for an IP packet and protection against a replay attack
Transport mode
an IPSec mode in which only an IP payload is authenticated and encrypted, not the IP header.
Tunnel mode
an IPSec mode in which an IP packet (IP header and IP payload) is authenticated, encrypted, and encapsulated in a tunneling protocol
Network segmentation
the act of partitioning a network into segments. Network segmentation is used to create security zones
security zone
a network segment that has specific security requirements.
trusted zone
a security zone that contains protected network resources that should only be accessible by an authorized user or system.
untrusted zone
a security zone that is outside an organization’s control
virtual local area network (VLAN)
a broadcast domain that is segmented at the data link layer.
jump server
a minimally configured server in a security zone that is used for managing the hosts in the security zone
demilitarized zone
a security zone that lies between a trusted and an untrusted zone.
Port-based VLAN
a VLAN in which a host is connected to a specific switch port that is assigned to a VLAN
Protocol-based VLAN
a VLAN in which protocol types are used to assign a host to a VLAN
MAC-based VLAN
a VLAN in which a host’s MAC address is used to assign the host to a VLAN.
firewall
a network device or a software program that controls inbound and outbound traffic based on a set of rules
hardware firewall
a firewall that is implemented in a physical device
software firewall
a firewall that is implemented in software and runs on a general-purpose computer
open-source firewall
software firewall with freely available source code that can be modified and redistributed
proprietary firewall
a firewall that is built by an entity that has exclusive rights to the firewall
stateless firewall
a firewall that allows or blocks a packet based on the information in the packet header
access control list (ACL)
a list of rules used by a firewall to control inbound and outbound network traffic
stateful firewall
a firewall that monitors and tracks active network connection sessions and blocks a packet that does not belong to an active session
unified threat management (UTM)
a security appliance that provides multiple security functions at a single point on a network
next-generation firewall (NGFW)
a firewall that combines the functionality of a packet filtering firewall with other technologies to detect and block a network attack
virtual firewall
a software or hardware firewall that provides packet filtering within a virtualized environment
Hypervisor mode
a virtual firewall mode in which a firewall resides in a host’s hypervisor kernel and monitors and controls inbound/outbound traffic on the virtual machines running on the host.
Bridge mode
a virtual firewall mode in which a firewall runs on a virtual machine and monitors and controls inbound/outbound traffic on the virtual machine.
host-based firewall
a software firewall that runs on a host and controls the host’s inbound and outbound network traffic
network address translation (NAT) gateway
a device that enables multiple hosts with private IP addresses to connect to the Internet using a single public IP address.
web application firewall (WAF)
a specific form of application firewall that monitors and filters HTTP and HTTPS traffic between a web application and the Internet
application firewall
a firewall that controls an application’s input and output.
URL filtering
he act of blocking access to a URL
intrusion detection system (IDS)
a device or a software application that detects a malicious activity or a security policy violation in a system
Content filtering
the act of blocking access to content based on predefined criteria.
Network Intrusion Detection System (NIDS)
an IDS that detects a threat to a network.
Network Intrusion Prevention system (NIPS)
a NIDS that blocks a threat to a network.
host-based intrusion detection system (HIDS)
an IDS that detects a threat to a host
Inline mode
a NIDS/NIPS deployment mode in which network traffic is passed through a NIDS/NIPS
Passive mode
a NIDS/NIPS deployment mode in which a NIDS/NIPS receives a copy of network traffic.
Signature-based detection
a detection method that detects an attack by using the attack’s pattern
Anomaly-based detection
a detection method that detects an attack by identifying a network state that is different from the network’s normal state
Behavior-based detection
a detection method that detects an attack by searching for a specific pattern that matches a threat behavior
Heuristic-based detection
a detection method that detects an attack by adaptive techniques
virtual private network (VPN)
a service using encryption to connect devices over a public network
site-to-site VPN
a connection between two or more networks