Week 3 Flashcards

1
Q

What are the 3 CND capabilities?

A
  • protect
  • monitor, detect, analyze
  • respond
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the purpose of NCDOC.

A

Navy’s CND provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where does the U.S. Fleet send all of its network traffic?

A

1 of 4 NOCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are the 4 regional NOCS located?

A
  • ECRNOC
  • PRNOC
  • UARNOC
  • IORNOC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the ACS provide?

A

Single management point for user credentials controlling verification, validation, and auditing for asset access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is AAA?

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is authentication?

A

Confirming the ID of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is authorization?

A

Determines what functions a user can have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 2 security protocols associated to ACS and which one is CISCO propriety?

A

RADIUS
TACAS +

TACAS + is CICSCO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What command will show you the last several commands in EXEC mode?

A

Show history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User exec mode sign
Privileged exec sign
Global config sign

A

> #
(Config)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where is the routers startup config file stored?

A

NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is he purpose of the spanning tree protocol?

A

Loop free topology and redundant paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What feature implements software to protect TCP servers from TCP SYN-flooding attacks?

A

TCP intercept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What command will allow you to perform router system backup?

A

Copy startup-config tftp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can you view from the show environment command?

A

Hardware alarms, temps, power supply status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of firewall inspects traffic aT the application layer?

A

Firewall proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of filter inspects traffic at the network and transport layers?

A

Packet filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A ________ refers to the area of a network that contains the endpoint.

A

Burb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How is the Mcafee Firewall Enterprise managed?

A

Firewall Enterprise Control Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What components does he Mcafee Firewall Cinteil Center consist of?

A
  • control center client suite

- control center management server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are he 2 common designs of VPNs?

A

Site to site

Host to site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which VPN protocol can operate in transport and tunnel mode?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the 2 products that make up he CND-S IVS?

A
  • fortimanager

- fortigate

25
Q

What is the purpose of having two in-line virus scanners?

A
  • redundancy

- load balancing

26
Q

What port is DNS?

A

53

27
Q

What are the 2 DNS configuration commands and what do they do?

A

Chuser : changes root directory

Chroot: changes user roots

28
Q

What is AIDE used for?

A
  • file integrity checker

- ensures DNS database are not corrupted

29
Q

What is a rogue access point?

A

Unauthorized and unknown access points that have been connected to the network

30
Q

Describe the two types of wireless LAN attacks

A

Passive: does not modify
Active: makes changes

31
Q

Eavesdropping/sniffing

A

Listening, monitors

32
Q

Traffic analysis

A

Gaining intel WITH INTENTION

33
Q

DOS

A

Floods one or more wireless devices

34
Q

Impersonation Attack

A

MAC Spoofing

35
Q

Evil Twin

A

Duplicating SSIDs and MAC addresses

36
Q

Man in the Middle Attack

A

Inserts themselves

37
Q

Authentication Attack

A

Passwords, authentication process

38
Q

Encryption cracking

A

Encrypted cracking software, encrypted packets

39
Q

Injection Attack

A

Generating beacon responses

40
Q

Peer-to-peer Attack

A

Ad-hoc mode

41
Q

Define WPA.

A

Standard created to address weakness of the WEP encryption by using dynamic encryption key generation

42
Q

What 3 categories does data fall into and explain.

A
  • Data at rest: saved files
  • Data in use: files being edited
  • Data in motion: email, data being transmitted
43
Q

What 3 sections is metadata broken into and describe.

A
  • Descriptive: titles, authors, key words
  • Structural: pages, chapters
  • Admin: permissions, file types
44
Q

What are some examples of hidden data?

A
  • document properties and personal info
  • headers/footers
  • invisible content
  • off slide content
  • presentation notes
  • hidden text
45
Q

5 pillars of IA and explain.

A
  • confidentiality: restricted access
  • integrity: can flex be edited or altered without encryption key
  • availability: data can be accessed
  • authentication: data coming from trusted source
  • non-repudiation: you send it, no take backs
46
Q

What are the three main types of encryption?

A
  • hash
  • symmetric
  • asymmetric
47
Q

What are the key terms associated to encryption and decryption?

A
  • cleartext
  • plaintext
  • algorithm
  • keys
  • ciohertext
48
Q

What is cleartext

A

No encryption

49
Q

What is plaintext

A

Cleartext that is to be encrypted

50
Q

What is algorithm

A

Procedures or formulas

51
Q

What is key?

A

Mathematical values

52
Q

What is ciphertext?

A

Encrypted text

53
Q

What are the common hash types?

A
  • MD5

- SHA

54
Q

What encryption algorithm allows he ability to both encrypt and decrypt data streams?

A

Symmetric

55
Q

Which keys are generated by the master secret key?

A
  • client write MAC secret
  • server write MAC secret
  • client write key
  • server write key
56
Q

What is a CA, RA, CRL?

A

CA: trusted third party
RA: handles and processes certificate requests
CRL: list of revokes certs

57
Q

What algorithm performs authentication in the Cipher Suite?

A

Key exchange algorithm

58
Q

Two asymmetric keys

A
  • public

- private

59
Q

3 utilities of SSH

A

Slogin command
SSH
SCP