Unit 3 Flashcards
What is the function of
SMTP (Simple Mail Transfer Protocol)
Standard communication protocol for electronic mail transmission.
What is the function of
POP3 (Post Office Protocol 3)
An internet protocol that is used by e-mail clients to retrieve emails from a mail server.
What is the function of
FTP (File Transfer Protocol)
Standard communication protocol for the transfer of computer files.
What is the function of
HTTP (Hypertext Transfer Protocol)
A protocol that transfers data between a user’s browser and a website server.
What is the function of
HTTPS (Hypertext Transfer Protocol Secure)
A protocol that secures communication and data transfer between a user’s browser and a website server.
Provides a level of encryption, which makes it more secure than HTTP..
What is the function of
ICMP (Internet Control Access Protocol)
Used by a router to exchange information with other routers.
What is the function of
TCP (Transmission Control Protocol)
A transport protocol that is used on top of IP to ensure reliable transmission of packets.
What is a
Denial of Service Atttack
An attacker floods a server with data so that it cannot respond to genuine users.
What is a
Distributed Denial of Service Attack
Multiple machines target a single server to perform a denial of service attack.
What is a
Teardrop Attack
The attacker sends fragmented packets to a server, so the server cannot reassemble the packets and is overloaded.
(Type of DoS attack)
What is a
SYN Packet
Client requests connection to a server by sending packet
First step of a TCP handshake
What is a
SYN-ACK Packet
Server’s reply to a SYN packet
Second step of a TCP handshake
What is an
ACK Packet
Shows that Client acknowledges the server and allows the start of a reliable connection
Third step of a TCP Handshake
What is a
Reflected XSS Attack
The malicious code resides in a link, and isn’t stored in a server’s database
What is a
Stored XSS Attack
The malicious code resides on a web page or in a database
What are
RST Cookies
A server intentionally sends an invalid SYN-ACK packet to a client. If the client generates an AST packet, the server knows the request is legitimate.
Mitigation Technique
What is
Stack Tweaking
Altering the TCP stack on a server so that it will take less time to time out when a SYN connection is left incomplete.
What is a
SYN Flood
Attacker sends a large amount of SYN packets to a server
What are
SYN Cookies
Cookies used to authenticate connection requests
What is a
ICMP Flood
ICMP Echo packets are sent to a target from a spoofed ip address. Target responds to each packet and reaches limit of packets per second sent.
What is the port number of
HTTPS
443
What is the port number of
HTTP
80
What is the port number of
IMAP
143
What is the port number of
POP3
110
What is the port number of
FTP
20/21
What is the port number of
SMTP
25
What are
Micro Blocks
Allocating a micro record instead of a complete connection for each request.
What are
Loose-lipped error messages
A message to a web browser that reveals potentially damaging information about the server’s configuration usable by a hacker.