Volume 2 - Chapter 9: Security Architectures Flashcards

1
Q

What terminology best describes the following?:

A weakness that could potentially compromise the security of a system.

A

A vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What terminology best describes the following?:

A tool or method to take advantage of a vulnerability to gain access to a privileged system.

A

An exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe a threat.

A

A threat is a potential to use an exploit against a vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A technique that is used to counteract or prevent malicious activity is referred to as?

A

Mitigation Techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe how TCP messages are involved in a Denial-of-Service attack.

A

An attacker will send multiple TCP SYN-ACK messages to its target in rapid succession.

This will eventually fill all available TCP connections on the server, making it unable to open new connections with valid clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the function of a reflection attack.

A

An attacker will spoof its source IP address to match the target’s IP address. The attacker will send traffic to a reflector with this spoofed source IP and the reflector will respond to the victim rather than the attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the function of an amplification attack.

A

An amplification attack will specifically utilize applications that generate large amounts of traffic. These large responses from the reflector will then be directed to the target device because of the spoofed source IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe how ARP messages are utilized in a man-in-the-middle attack.

A
  1. A client sends an broadcasted ARP request for a server that it wants to communicate with
  2. An attacker responds to the ARP request with it’s own MAC address; pretending to be the server
  3. The client then sends data to the attacker, rather than the server
  4. The attacker then can modify the traffic and send it to the server, or just listen in on the traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of attack best describes the following?:

An attacker using tools such as nslookup, dig, and performing ping sweeps to identify potential vulnerabilities that affect a workstation.

A

A reconnaissance attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of malware best describes the following?:

A piece of software that disguises itself within other software to appear legitimate.

A

A Trojan Horse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of malware best describes the following?:

A piece of software that injects itself into other legitimate software, which end users will end up spreading to other systems.

A

A virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of malware best describes the following?:

A piece of software that has the capability to spread and infect multiple systems itself.

A

A worm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the difference between Phishing and Spear-Phishing.

A

Spear-phishing uses a more personalized approach by researching information about the target to make the attach more personal and seem legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the difference between vishing and smishing.

A

Vishing: voice call phishing
Smishing: SMS text phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What human vulnerability best describes the following?:

Compromising legitiate web services, then modifying links to direct people to malicious sites or services

A

Pharming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What human vulnerability best describes the following?:

An attacker researching who uses a specific website the most frequently and injecting malware into a site to target those specific users.

A

A watering hole attack.

17
Q

Describe the difference between dictionary attacks versus brute-force attacks.

A

Dictionary attacks attempt to discover users passwords by trying specific words and phrases.

Brute-force attacks attempt every single password combination

18
Q

Describe the 3 components of AAA.

A

Authentication: Who is the user?
Authorization: What is the user allowed to do?
Accounting: What did the user do?

19
Q

What port and transport protocol is used by TACACS+

A

TCP Port 49

20
Q

What port and transport protocol is used by RADIUS+

A

UDP Ports 1812 and 1813

21
Q

Describe how RADIUS and TACACS+ differ in regards to encryption.

A

Both support encrypting the password, but only TACACS+ encrypts the entire packet

22
Q

Describe how RADIUS and TACACS+ are used for different services.

A

RADIUS is most commonly used for authenticating end users.

TACACS+ is most commonly used for authenticating network devices.

23
Q

Which AAA protocol is Cisco proprietary?

A

TACACS+