Security + Flashcards

1
Q

vulnerability

A

flaw that affects security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

flaw that affects security

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat vector

A

The path that the threat takes to the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The path that the threat takes to the target

A

Threat vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some common paths threat vectors can take?

A
  • email:embedded links, attached files
  • web browser: Fake site, session hijack
  • wireless hot spot: Rogue access point
  • telephone: Social engineering
  • USB Flash drive: Auto - executing malware
  • physical access: Stolen data and equiptment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nmap is a utility used for ________ discovery, administration and security auditing.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the name of a utility used for network discovery, administration and security auditing?

A

Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In our Nmap lab we will learn and understand how to:

A
  • scan a whole Subnet
  • trace all the sent and received packets
  • perform a slow comprensive scan
  • create a new profile to perform a nul scan
  • scan TCP and UDP ports
  • Analyze host details and their topology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP Connect Scan

A

Uses a normal TCP connection to determine if a port is available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Xmas Scan

A

Involves sending TCP segments with the all flags sent in the packet header, generating packets taht are illegal according to RFC 793.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ACK Flag Scan

A

Involves sending spoofed packets to a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Information Security Triad

A

More secure means harder to use; less functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

confidentiality

A

The data is only readable by those authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Integrety

A

The data has not changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Availability

A

The data is accessable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authenticity

A

The data source is valid

17
Q

Non repudiation

A

The data source can not deny it’s creation

18
Q

What are the five pillars of Information Security?

A
Confidentiality
Integrity
Availability
Authenticity
Non - Repudiation
19
Q
  • email:embedded links, attached files
  • web browser: Fake site, session hijack
  • wireless hot spot: Rogue access point
  • telephone: Social engineering
  • USB Flash drive: Auto - executing malware
  • physical access: Stolen data and equipment
A

Common paths threat vectors can take

20
Q

Nmap can be used for:

  • scan a whole _________
  • ______ all the sent and received packets
  • perform a slow comprehensive scan
  • create a new profile to perform a nul scan
  • scan TCP and UDP ports
  • Analyze host details and their topology
A

Subnet

trace

21
Q

Nmap can be used for:

  • scan a whole Subnet
  • trace all the sent and received ______
  • perform a slow comprehensive _______
  • create a ____ ______ to perform a nul scan
  • scan __________________ ports
  • Analyze host details and their ___________
A
packets
scan
new profile
TCP and UDP
topology
22
Q

“A” record (AAAA) A stands for address and this is how we ultimately define a name with an IP address. A IPV4 AAAA IPV6

A

One of the most common records on the DNS server