Straw Flashcards

1
Q

NAC

A

Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SEAL

A

Software Optimised Encryption Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VPN encryption ?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HTTPS

A

Hyper Text transport Protocol secure - used to access a secured server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IPSEC

A

Internet Protocol Security - set of protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Diffie Helman

A

algorithm - allows peers to exchange shared keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NAT

A

Network Address translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ASA

A

adaptive security appliance - combine firewall, antivirus, IPV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Zen map

A

GUI - nap security scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

nmap

A

security scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ISR

A

Intelligence, surveillance and reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC

A

media access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ISP

A

internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

router

A

directs packets (network layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

switches

A

deliver frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

proxies

A

protect local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Linus

A

open source operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP?IP. # way

A

SYN, SYN-ACK,Ack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ARP

A

address resolution protocol - internet protocol for addressing IP address to a physical machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SSL

A

Secure socket layer - encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MD5

A

hash, detects tampering of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CLI

A

Command line interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

MIB

A

Management Info Box

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Tacas
Terminal access controller access control - Handles AAA
26
ACL
Access control list
27
TCP
Transmission control protocol
28
UDP
user datagram protocol - connectionless
29
ICMP
Internet control message protocol - error - reporting protocol for router
30
Mantraps
prevent piggy backing and tailgating
31
PKI
public key infrastructure - control keys/certificate
32
WPA
Wifi Protected Access
33
White box testing
full knowledge by target env
34
L2TP
Layer 2 tunnelling protocol. UPN tech used to establish secure connection
35
NIPS
network intrusion protection systems
36
NIDS
network intrusion detection systems
37
worm
propagates
38
FTP
File transfer protocol
39
FTP
no encryption
40
SSH
secure shell, protocol meant to be safer than FTP and telnet
41
IP address logical?
yes
42
IPV6
128
43
IPV4
32
44
DNS
domain name server
45
DHCP
dynamic host configuration protocol- allows server to automatically assign IP address to computer
46
ASA
Adaptive security appliance
47
An IOS router firewall solution
ASA
48
what does ASA software combine
firewall, VPN concentrator, and intrusion prevention functionality into one software image
49
DMZ
Demilitarized zone that allows both inside and outside users access to protected network resources
50
security level numbers
range from 0 (untrustworthy) to 100 (very trustworthy)
51
Like IOS routers, the ASA supports Network Address Translation (NAT
is typically used to translate private IP network addresses into public IP addresses.
52
AAA
Authentication, authorization, and accounting.Using AAA only, authenticated and authorized users can be permitted to connect through the ASA.
53
Modular Policy Framework (MPF
MPF) configuration defines a set of rules for applying firewall features, such as traffic inspection and QoS, to the traffic that traverses the ASA
54
ICMP
Internet Control Message Protocol
55
ASA
Adaptive Security appliance
56
IPSec
Internet Protocol security
57
SMTP
Simple Mail transfer protocol
58
asdm
Cisco's Adaptive Security Device Manager
59
HIDS
Host based IDS
60
Stateful Inspection
Bob sends request to internet. ASA remembers it and inspects it and members its for Bob and dynamically lets it through
61
10 and 102 address are
private
62
connect to head office
VPN tunnel and use SSL or IPSec
63
Nmap/Zenmap
- Discovers computers and services on a computer network, thus creating a map of the network
64
SuperScan
SuperScan - Port scanning software designed to detect open TCP and UDP ports, determine what services are running on those ports, and to run queries, such as whois, ping, traceroute, and hostname lookups
65
Metasploit -
Provides information about vulnerabilities and aids in penetration testing and IDS signature development
66
AP
Access point
67
Burp Suite
Web proxy testing tool. integrated platform for performing security testing of web applications. mapping and analysis of an application's attack surface, through to finding and exploiting security vulnerabilities
68
Nikto
scan common security vulnerabilities
69
NMAP
Detect the live host on the network (host discovery) open ports on the host (port discovery or enumeration)
70
SQL map
open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers
71
SQL
SQL stands for Structured Query Language. SQL lets you access and manipulate databases
72
XSS
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
73
Insecure Direct Object References
s occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources in the system directly, for example database records or files. Example opening a persons file then changing number in browser