Telecommunications and Network Security Flashcards

1
Q

Attackers Methodology

A
  1. Target Acquisition
  2. Target Analysis
  3. Target Access
  4. Target Appropriation
  5. Sustain Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Scanners (Network Security Tools)

A
  1. Discovery (Nmap)
  2. Compliance
  3. Vulnerability (Nessus)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

______ access, not ______ access is the driving force behind the design of most network protocols

A

Fast, Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical Layer

A
  1. Analog vs. Digital Communications
  2. Network Topologies
  3. Cabling
  4. Wireless Transmission
  5. Mobile Telephony
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Link Layer

A
  1. Architecture

2. Transmission Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Link Layer Technolgies

A
  1. Ethernet

2. Wireless LANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bluetooth

A

Shore-range wireless communications

Very vulnerable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bluejacking

A

Allows an anonymous message to be displayed on the victim’s device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Buffer Overflow

A

Attacker can remotely exploit bugs in software on Bluetooth-enabled devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blue Bug Attack

A

Attacker can use the AT commands on a victim’s cell phone to initiate calls, send SMS messages, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SNARF Attack

A

Unauthorized access of information from a wireless device through a Bluetooth connection; access to calendar, contacts, emails, text messages, etc.
Theft of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virtual Private Network (VPN)

A

Encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure Shell (SSH)

A

Allows users to login to remote computer over an encrypted tunnel
Protects integrity of communications and strong authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly