Technologies And Tools Flashcards

1
Q

Layers of the OSI Model

A
Physical
Data
Network
Transport
Session
Presentation
Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define IP

A

Internet Protocol, delivers packets across layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define TCP

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TCP Flags

A

Syn opens connect
Fin terminates connect
Ack acknowledges request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define UDP

A

User Data Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Primary difference between UDP and TCP

A

UDP does not send acknowledge responses (one way comms)

TCP is connection oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS Look Up Port Number

A

53 via UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FTP Port Number

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSH Port Number

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RDP Port Number

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SMTP Port Number

A

25 Unencrypted

465 Encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

POP Port Number

A

110 Unencryted

995 Encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IMAP Port Number

A

143 Unencrypted

993 Encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTP Port Number

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HTTPS Port Number

A

443 with SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Purpose of a Switch

A

Create Networks on layers 2 and limited layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Purpose of Routers

A

Connect networks via ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Purpose of Bridges

A

Connect only two nets over layer 2 between MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Purpose of a Media Gateway

A

Translate between network types (i.e. 3G, 4G, LTE, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define a Stateful Firewall

A

Tracks outgoing communications to determine open connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Purpose of Explicit Deny Rule

A

To generate logs, implicit deny is not logged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Firewall Positioning

A

typically between router and internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Difference between a Forward Proxy and Reverse Proxy

A

Forward Proxy is on client’s side (i.e. a web browser)

Reverse Proxy is on a server’s side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Purpose of a Transparent Proxy

A

Also called “In-line, intercepting, or forced” proxy

Intercepts connection between client and server without modifying requests and responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Load Balancer Modes

A

Round-Robin Scheduling

Session Persistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

VPN Types

A

Site-to-site

Remote Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

VPN Endpoints

A

Firewalls
Routers
Servers
VPN Concentrators (for high volume)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

VPN Modes

A

Full Tunnel

Split Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

IPsec Functions

A
Adds security to TCP/IP via:
Internet Key Exchange (IKE)
Encapsulating Sec Payload (ESP) for Confidentiality
Authentication Header (AH)
*Not compatible for dynamic NAT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define NIDS

A

Network Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define NIPS

A

Network Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define HIPS

A

Host Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Define HIDS

A

Host Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Detection Methods

A

Signature Based

Anomaly/Behavior/Heuristic Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define OAuth

A

Federated SSO for web authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Define Open ID Connect

A

Authentication protocol for OAuth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Firewall Rule Configuration Errors

A

Shadowed Rules
Promiscuous Rules
Orphaned Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Define a Shadow Rule

A

Rule never reached due to placement order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Define a Promiscuous Rule

A

Overly broad permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Define an Orphaned Rule

A

Rule built for decommissioned networks or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Types of Flooding Attacks

A

SYN flood

MAC flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Define STP and Purpose

A

Spanning Tree Protocol, prever loops in IP/MAC addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Network Monitoring Modes

A

Full Packet Capture

Net Flow Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Information in Net Flow Data

A

Source and Destination IP/Ports
Time
Amount of Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

SNMP PDU Types

A
GetRequest
SetRequest
GetNextRequest
GetBulkRequest
Response
Trap
InformRequest
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Storage Network Types

A

Network Attached Storage (NAS), file servers

Storage Area Network (SAN), raw disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

802.11 Network speed and frequency

A

2 Mbps on 2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

802.11b Network speed and frequency

A

11 Mbps on 2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

802.11g Network speed and frequency

A

22 Mbps on 2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

802.11n Network speed and frequency

A

600 Mbps on 2.4/5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

802.11ac Network Speeds

A

1 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Wireless Authentication Methods

A

Pre-shared Keys

Enterprise Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Pre-Shared Key Types

A

Hexadecimal String

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Enterprise Authentication Types

A

LEAP
EAP
PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

LEAP Algorithm Types

A

MS-CHAP (insecure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

EAP Algorithm Types

A

TLS
TTLS
MD5 (Insecure)
FAST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Define PEAP

A

EAP tunneled in encrypted TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Wireless Antennae Types

A

Omni-Directional
Directional
Beam forming (Virtual Directional)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

WAP HW Types

A

Fat; contain hardware and software

Thin; contain hardware only, configured via wireless controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Define WORM

A

Write Once Read Many, permanent logs sent to SIEMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Define NTP

A

Network Time Protocol, sync devices to centralized time server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

DLP Environments

A

Host
Network
Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

DLP Methods

A

Pattern matching

Watermarking

64
Q

802.1x Protocol Components

A

Supplicant
Switch/Authenticator
Server

65
Q

NAC/NAP Postures

A

Persistent Agent
Dissolvable
Agentless

66
Q

Purpose of Protocol Analyzers

A

Packet sniffing; monitor network traffic and sort by protocol

67
Q

Purpose of Network Scanners

A

Detect active systems

OS Fingerprinting

68
Q

Common Command Line Networking Prompts

A
Ping
Traceroute/tracert 
Ifconfig/ipconfig
Arp 
Netstat/ss
Nc
Dig/nslookup
69
Q

Ping Command Function

A

Check remote system accessibility over ICMP

70
Q

Traceroute/tracert Command Function

A

Determine network path to destination

Devices listed as *** do not self-identify

71
Q

Ifconfig/ipconfig Command Function

A

View or change configuration

72
Q

Arp Command Function

A

View ARP cache on local network

73
Q

Netstat/ss Command Function

A

View all active network connections;

  • a (listening and non-listening sockets)
  • l (listening sockets)
  • s (statistics for each protocol)
  • i (table of network interfaces)
74
Q

Nc Command Function

A

Send and receive raw code over network

Not available on windows

75
Q

Dig/nslookup Command Function

A

Correlate IP addresses and domain names over DNS

76
Q

Telnet Secure Alternative

A

SSH

77
Q

FTP Secure Alternative

A

SFTP

78
Q

HTTP Secure Alternative

A

HTTPS using SSL

79
Q

Network Level Additional Protection Measures

A

VPN

SSH Tunneling

80
Q

Types of Certificate Errors

A

Expired
Mismatched Names
Untrusted CA
Revoked

81
Q

Request for Change (RFC) Components

A
Description
Impact
Risks
Mitigation
Users
Schedule
Affected Systems
82
Q

Difference between Configuration and Change Management

A

Configuration Management is for specific products

Change Management is for systems and processes

83
Q

OS Security Issues

A

Baseline Settings
Patch Management
System Hardening

84
Q

Application Control Methods

A

White Listing

Black Listing

85
Q

Mobile Networking Methods

A
Cellular
WiFi
SAT Comms
NFC
Bluetooth
ANT
Infrared
USB
86
Q

MDM Solutions/Uses

A

Configuration Management
Prevent user modifications
Revoke access/remote wipe
Application Control

87
Q

Define Containerization

A

Separate memory allocation for secure/unsecured or business/personal

88
Q

Define geolocation

A

Track location information

89
Q

Purpose of Geofencing

A

Alert when leaving area

Limit access to specific area

90
Q

MDM Solutions Circumvention

A

Side loading

Jailbreaking

91
Q

Mobile Deployment Methods

A

BYOD
CYOD
COPE
COBO

92
Q

SNMPv1 and 2 Vulnerability

A

Plain Text Authentication

93
Q

WPS Brute Force Protection

A

Disable WPS

Update firmware

94
Q

WEP Encryption

A

RC4

95
Q

WPA Encryption

A

TKIP

96
Q

WPA2 Encryption

A

AES:
CBC-MAC for integrity
CCMP for key rotation

97
Q

IV Role

A

Build decryption table

Compute RC4 key stream

98
Q

Define EFS

A

Encryption File System, allows for encryption of individual files or folders

99
Q

Define ANT

A

Adaptive Network Topology

Proprietary tech used primarily for sports and health

100
Q

Private IP Address Ranges

A
  1. 0.0.1-10.255.255.255
  2. 16.0.1-172.31.255.255
  3. 168.0.1-192.168.255.255
101
Q

Benefits of Immutable Systems

A

Lower IT Complexity

Easy to Troubleshoot

102
Q

Purpose of Collectors

A

Receive sensory input

103
Q

DNSSEC Key Distribution Steps between Servers

A

Sign a zone
Share DNS folder
Import DNSSEC key

104
Q

APT Threat Prevention

A

Restrict administrative privileges
Application whitelisting
Patch updates for applications, OS, firmware for systems and network devices

105
Q

Define a Null Ciphers

A

Simple form of steganography hiding a message in a larger message or mass of characters requiring a cipher to decrypt (also called a concealment cipher)

106
Q

Define a Visual Semagram

A

Form of steganography hiding a message in an image (real or digital)

107
Q

Define a Text Semagram

A

Form of steganography hiding a message in a text based on text characteristics

108
Q

LDAP Protocol Methods

A

SSL (layer 5)

TLS (layer 4-7?)

109
Q

Common Banner Grabbing Tools

A
Telnet
Wget
cURL
NMAP
Nc
DMitry
110
Q

Define a Credentialed Scan

A

Scan conducted from an account on the network

111
Q

WYOD Protections

A

EMM Remote wipe

Ability to disable bluetooth connectivity

112
Q

Access Point Setup Features

A
MAC Filtering
Encryption Algorithm
Key length
Default Passwords
Maximum users
113
Q

Meaning of DEP Value of 0

A

Always off

114
Q

Meaning of DEP Value of 1

A

Always on

115
Q

Meaning of DEP Value of 2

A

On for windows binary files

116
Q

Meaning of DEP Value of 3

A

On for all programs and services

117
Q

Define DEP

A

Data Execution Prevention

118
Q

802.11a speed and frequency

A

5 Mbps on 2.4 GHz

119
Q

Types of Vulnerability Scanner Tools

A

Nessus
Retina Vulnerability Assessment Scanner
Microsoft Baseline Security Analyzer (MBSA)

120
Q

MBSA Scan Features

A
Open Ports
Active IP Addresses
Running applications/services
Missing critical patches
Default user account which have not been disabled
Default, blank, or common passwords
121
Q

Define OVAL

A

Open Vulnerability and Assessment Language; international standard for testing, analyzing, and reporting the security vulnerabilities of a system

122
Q

MDM Location Tracking Accuracy (Most to least)

A

GPS
Wi-Fi Triangulation
Cell phone tower triangulation
IP Address resolution

123
Q

Define MEM and purpose

A

Mobile Endpoint Managment; automate asset tracking and inventory control process

124
Q

Define a Trunk port

A

A member of all VLANs defined on a switch for carrying traffic between switches

125
Q

Define Windows Intune

A

Windows RT tablet management solution

126
Q

Windows Intune Features

A

Admin Portal: Remote wipe and password changes
Account Portal: Manage subscriptions, users, groups and domains
Company Portal: End user manager their own accounts and enroll devices

127
Q

Difference between Application Aware Firewall, IDS/IPS, and Proxy

A

Firewall: enforce security rules
IDS/IPS: analyze network packets
Proxy: Improve performance and content filtering

128
Q

IPsec NAP Enforcement Method

A

Issued certificates prior to network connection

129
Q

Switch and WAP Access Control Method

A

MAC address filtering

130
Q

Least Secure Location for Omni-Directional Antennae

A

Against a perimeter wall/window

131
Q

DTP Vulnerability

A

potential for unauthorized devices to modify configuration information

132
Q

Define DTP

A

Data Trunking Protocol; automatically detects ports that are trunk ports and negotiate the trunking protocol between devices

133
Q

VLAN Creation Hardware

A

A Switch, switch port is used to identify which VLAN a device belongs to

134
Q

Define a NIC

A

Network Interface Controller, by default only accepts frames addressed to that specific NIC

135
Q

Purpose of a Network Hub

A

Sends packets to all device ports

136
Q

Define Network Bonding

A

Logically groups two or more network adapters for a single network connection

137
Q

Explain Network Communication Security Setting Configuration

A

Managed by a GPO computer policy

138
Q

Define User Rights

A

Special category of computer policies that identify maintenance tasks and the users/groups who can perform said actions

139
Q

NAC/NAP Components

A

Health validation,
802.1x authentication,
IPsec enforcement

140
Q

GPO Application Order

A

Local Group Policy,
GPO’s linked to the site,
GPO’s linked to the user/computer domain,
GPO’s linked to the organizational unit (OU) from highest to lowest

141
Q

DLP Monitoring States

A

Data in use on endpoints,
Data in motion transmitted over a network,
Data at rest on a storage medium,
Data transmitted to/from cloud-based systems

142
Q

Key Exchange Protocols

A

TLS: DH or RSA
SSL: KEA or RSA
IPsec: IKE

143
Q

Define IDEA

A

International Data Encryption Algorithm, symmetric-key block cipher

144
Q

SSH Algorithms

A

IDEA (default)
Blowfish
DES

145
Q

Explain the purpose of Firewall Logs

A

Identify traffic allowed or denied through the firewall (servers running specific services, device communicating via specific ports, etc.)

146
Q

Explain the purpose of Systems Logs

A

Record OS, system, and HW events (logons, logon attempts, user rights, etc.)

147
Q

Explain the purpose of Application Logs

A

Record actions performed by applications

148
Q

Explain the purpose of Performance Logs

A

Record information about system resources (network connections, processors, memory, disks, and network utilization)

149
Q

Archived Logs Primary Considerations

A

Disk space required
Backup requirements on the server
Time stamping
Integrity of the logs

150
Q

Application Level Audit Components

A

Logon/Logon Attempts
User Name
Start/End Time of access
Activities performed

151
Q

Purpose of Promiscuous Mode (p-mode)

A

Visibility for packet sniffers viewing captured frames sent to a NIC

152
Q

Purpose of a Throughput Tester

A

Measure the amount of data that can be transferred through a network (aka bandwidth)

153
Q

Linux TCP Port Scan Command

A

nmap -sT

154
Q

Linux UDP Port Scan Command

A

nmap -sU

155
Q

Purpose of TPM

A

Generate and store cryptographic keys

Generate hash values of system components

156
Q

Linux server Installed Software RPM Package List Command

A

yum list installed