Security test Flashcards

1
Q

HTTPS

A

It is the secure version of HTTP, a protocol used for viewing web pages. It encrypts the data which is being transferred between computers and servers over the internet. The encryption protocol for HTTPS is SSL or TLS. When entering a secure website, the user’s browser will ask for a digital certificate from the website. The digital certificate will be verified, and session keys will be created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP vs UDP

A
  • TCP creates a connection before sending data using a 3-way handshake. The UDP doesn’t do that.
  • TCP guarantees that the data will be delivered to its destination while in UDP data delivery cannot be guaranteed.
  • TCP is slower while UDP is faster.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

KERBEROS

A

Is an authentication protocol that authenticates service requests between two or more trusted hosts across an untrusted network. At the heart of the protocol there’s the KDC which functions as the authentication service. Using this protocol when the user wants to access a service, the user will send a message to the AS and after authentication will receive a TGT. The user will send the TGT to the TGS. After validation, the TGS will send the user a service ticket. Using this ticket, the user will be able to get access to the service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Default gateway

A

1 computer can have only one default gateway. In order to reach a remote network, a default gateway needs to be established. There can be only one default gateway because if we don’t know the mac address of the destination IP, there can be only one address that we go to and usually it is the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ports

A
  • 0 – 1023 - Well known ports
  • 1024 – 49151 - Registered ports
  • 49152 – 65535 - Dynamic, Private ports.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Broadcast

A

A way for devices to communicate with one another. When a device uses broadcast, it sends one packet to all the devices in the network. Usually it is used for ARP requests or DHCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP

A

A protocol used to translate IP address to MAC address. When a device wants to communicate with another device on the same network, it will need the mac address of that device. First, it will check ARP table to see if that device is registered. If not, it will broadcast a message to the network and the device with the required IP address will send its MAC address back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DHCP

A

This protocol allows a DHCP server to automatically assign TCP/IP network configuration to a device in the network. This process can be broken into 4 stages:

a. Discover – The client broadcasts a message attempting to find the DHCP server.
b. Offer – The DHCP server sends back an IP address and other network configuration data.
c. Request – The client accepts the given IP address and other info.
d. Ack – The server acknowledges the request and sends back all the necessary data to the client and saves a record of the request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Antivirus Vendors

A

a. Symantec
b. AVAST
c. Norton
d. Kaspersky
e. McAfee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FW Vendors

A

a. Check Point
b. Fortinet
c. Palo Alto
d. WatchGuard
e. Cisco

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MX Record

A

A DNS record that shows where emails sent to a certain domain should be routed to. Can have several email servers set per domain. Email servers have a priority which decides the order by which the mail is sent. Priority is described as a number and the lower the number, the higher the priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can a single host have multiple IP addresses?

A

Yes. A single host can have multiple NIC (Network Interface Card) with different IPs as well as one NIC with 2 different IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Can one IP address have multiple sites?

A

Yes. It is possible to have multiple sites on one host with one IP. The access to the sites is possible by assigning different ports to different sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NAT

A

Network Address Translation. The purpose of NAT is to translate from a private IP address to public and vice versa. The reason for that is the limited number of IPv4 public IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS

A

Domain Name System. The purpose of DNS is to translate domain names to IP addresses. The DNS works as a hierarchical system when looking for domain’s address. First, we will look for the address in the host’s cache memory, then the ISP and then the DNS root server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stateful vs Stateless FW

A

Stateful FWs keep track of the state of the connection (for example: by monitoring the TCP 3-way connection). This allows the stateful FW to know at which stage the connection is. They also use a state table to keep track of connection info. Stateless FWs check packets as they come based on information like source and destination and do not monitor the state of the connection. They are less resource extensive than stateful FWs.

17
Q

How to find open ports?

A

There’s a command called netstat that displays network connections. There can be several states to the connections: Listening, established, and closed.

18
Q

Scheduled vs Realtime scan

A

Realtime scanning runs in the background and scans the files when they are created, opened, copied, and saved. Scheduled scans run on a regular basis. They thoroughly check the system for viruses and other malware. Realtime scanning is very useful since it can find and quarantine the malware before it can cause any damage. Scheduled can also be useful to find dormant malware.

19
Q

Packet Sniffer

A

A program like Wireshark that can capture and analyze traffic and find sensitive info like Usernames, Passwords and so on. It is possible to filter traffic based on parameters like protocols and packet contents.

20
Q

Port Scanning

A

כאשר מחשב מכתובת IP אחת מבקר בהרבה פורטים שונים במחשב הנתקף תוך זמן קצר. משמעות הדבר יכולה להיות ניסיון תקיפה. חמור.