test ch 8-11

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which hexadecimal block in an IPv6 address is is used for the Subnet ID?

fourth block

Which formulas can be used to calculate the magic number?

256-(interesting octet) and 2^h

What is the formula for determining the number of possible hosts on a network?

2^h-2=y

What is the least number of bits you would need to borrow from the network portion of a class B subnet mask to get at least 130 hosts per subnet?

8 bits

White-hat hackers (ethical hackers)

break into systems for non-malicious reasons, such as to test system security vulnerabilities or to expose undisclosed weaknesses

black hat hackers

break into systems to destroy information or for illegal gain

A DNS record spreads to other DNS servers. What kind of attack is this?

DNS poisoning

S H A-2 and S H A-3 are often implemented together for what reason?

increased security

Which command on an Arista switch too many devices try to connect to a port?

switchport port security

MFA

requires 2 or more peices of identification

reverse proxy

routes incoming requests to the correct server

What's the essential difference between an IPS and an IDS?

IDS will detect and log suspicious activity. An IPS prevents traffic from reaching the protected network or host.

NGFW

Next Generation FireWall. Originating as a marketing term from Palo Alto Networks, NGFW means a very smart firewall that understands Application Layer (layer 7) protocols.

Why is a BPDU filter needed at the demark?

The ISP's STP related topology information shouldn't be mixed with a corporate networks STP related topology network.

Distributed DoS (D DoS) attack

Orchestrated through several sources, called zombies

What kind of ticket is help by KErbero's TGS?

TGT

The_____________command is used to assign a statement to an already-installed A C L

access-list

deauthentication attack

A form of wi-fi DoS attack.

VLAN functions at which layer?

Layer 2

Firewall

(computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers

How many bits of a class A IP address are used for host information?

24

Distributed reflector DoS (D R D S) attack

A D DoS attack bounced off of uninfected computers, called reflectors, before being directed at target

DHCP relay agent

A DHCP configuration that provides DHCP service to multiple VLANs. The relay agent receives a DHCP-related message, then creates its own message to send the specified DHCP traffic beyond the broadcast domain.

DRDoS attack

A Distributed Reflective Denial of Service attack prevents normal or legitimate activity by consuming resources or bandwidth using an amplification network to increase the severity of the attack. Smurf and fraggle attacks are DRDOS attacks where a spoofed packet is sent to a network (bounce site) that reflects the packet multiple times, or amplifies the reflection, to the victim. This floods the system with traffic preventing legitimate activities or transactions to occur. A single attacker directed against a single target. Preventing legitimate authorized access to a resource is the goal of a distributed reflective denial of service attack.

Data VLAN

A VLAN used by typical data devices connected to an Ethernet, like PCs and servers. Used in comparison to a Voice VLAN.

Unmanaged Switch

A basic Layer 2 switch. This will work simply by plugging it in and connecting it. It is not configurable.

VLSM (Variable Length Subnet Mask)

A classless subnet mask that can be customized to a different length for each subnet based on the number of nodes on that subnet.

logic bomb

A computer program or part of a program that lies dormant until it is triggered by a specific logical event.

grey hat hackers

A cross between black and white—they will often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches.

packet-filtering firewall

A firewall that examines each packet and determines whether to let the packet pass. To make this decision, it examines the source address, the destination addresses, and other data.

switch spoofing

A malicious host uses DTP to masquerade as a switch, with the goal of negotiating a trunk link and gaining access to additional VLANs.

Honeynet

A network of honeypots.

Nmap

A network utility designed to scan a network and create a map. Frequently used as a vulnerability scanner.

Metasploit

A penetration-testing tool that combines known scanning techniques and exploits to explore potentially new types of exploits.

Trunk Port

A port on a switch configured to carry all data, regardless of VLAN number, between all switches in a LAN.

Default VLAN

A preconfigured VLAN on a switch that includes all of the switch's ports and cannot be renamed or deleted. The switch might be preconfigured with other VLANs as well, depending on the device and manufacturer.

Spanning Tree Protocol (STP)

A protocol that uses the Spanning Tree algorithm, allowing a switch to dynamically work around loops in a network topology by creating a spanning tree. Switches exchange bridge protocol data unit (BPDU) messages with other switches to detect loops and then remove the loops by blocking selected switch interfaces.

Rogue D H C P server

A rogue D H C P server running on a client device could be used to implement a type of MitM attack

proxy server

A server that acts as an intermediary between a user and the Internet.

CIDR notation

A shorthand method for denoting the distinction between network and host bits in an IP address.

Managed Switch

A switch that can be configured via a command-line interface and sometimes can be configured in groups. Usually, they are assigned their own IP addresses. VLANs can only be implemented through managed switches.

IDS (Intrusion Detection System)

A system designed to monitor traffic and detect attacks.

Network Access Control (NAC)

A technique that examines the current state of a system or network device before it is allowed to connect to the network.

Insider Threat

A threat to an organization that comes from employees, contractors, and anyone else that may have willingly been given insider knowledge.

Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?

Access Control

What feature of Windows Server allows for agentless authentication?

Active directory

What software might be installed on a device in order to authenticate it to the network?

Agent

User awareness

An NGFW (Next Generation Firewall) feature that adapts a firewall's configuration to the class of a specific user or user group.

posture assessment

An assessment of an organization's security vulnerabilities. Posture assessments should be performed at least annually and preferably quarterly—or sooner if the network has undergone significant changes. For each risk found, it should rate the severity of a potential breach, as well as its likelihood of happening.

security audit

An assessment performed by a company that has been accredited by an agency that sets network security standards

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

DNS poisoning

An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's device.

Kerberos

An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.

Native VLAN

An untagged VLAN on a switch that will automatically receive all untagged frames. Options for native VLANs vary according to the switch manufacturer and model.

VTP (VLAN Trunking Protocol)

Cisco's protocol for exchanging VLAN information over trunks. VTP allows one switch on a network to centrally manage all VLANs.

Denial-of-service (DoS) attack

Hacker issues flood of broadcast ping messages

five subtypes of Dos attacks

DDOS DRDS DRSoS PDoS Friendly DoS

Double tagging attack

Hacker stacks V LAN tags in Ethernet frames

Any traffic that is not explicitly permitted in the ACL is ________ which is called__________.

Dropped; implicit deny

Segmentation accomplishes What?

Enhance security Improve performance Simplify troubleshooting

what causes most firewall failures

Firwall misconfiguration

Networks are commonly segmented according to one of the following groupings:

Geographic locations Departmental boundaries Device types

security token

Hardware device that must be present during login to authenticate a user.

What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?

It performs no authentication.

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

LDAP

On which networking device do you configure VLANS?

Layer 2 switch

subnetting happens at which layer?

Layer 3

At what layer do proxy servers operate?

Layer 7 application layer.

MDM software

Mobile Device Management software

Unified Threat Management (UTM)

Network hardware that provides multiple security functions.

RADIUS (Remote Authentication Dial-In User Service):

Open-source and standardized by the I E T F Runs in the Application layer and can use either U D P or T C P in the Transport layer Can operate as application on remote access server Or on dedicated RADIUS server Highly scalable May be used to authenticate wireless, mobile, and remote users RADIUS services are often combined with other network services on a single machine

What kinds of issues might indicate a misconfigured ACL?

Problems with performance between two hosts or when some applications or ports can make the connection while others cant.

Worms

Programs that run independently and travel between computers and across networks

Non-security devices with security features

Proxy servers and A C Ls

What are the two primary features that give proxy servers an advantage over NAT?

Proxy servers function at the application layer rather than lower at the network layer. They also improve performance for users accessing resources external to their network by caching filing.

RBAC

Role-based access control. An access control model that uses roles to define access and it is often implemented with groups. A user account is placed into a role, inheriting the rights and permissions of the role. Other access control models are MAC and DAC.

Only one _______ exsits on a network using STP?

Root bridge.

Which form of SHA was developed by private designers?

SHA-3

SHA

Secure Hashing Algorithm Most commonly used hashing algorithm Advantage: its resistance to collisions

Back door

Security flaws that allow unauthorized users to gain access to the system

which cisco command lists configured VLANs on a switch?

Show VLAN

Two primary methods for detecting threats:

Statistical anomaly detection and Signature-based detection

TACACS+

Terminal Access Controller Access Control System Plus

802.1Q

The IEEE standard that specifies how VLAN and trunking information appears in frames and how switches and bridges interpret that information.

What unique characteristic of zero-day exploits make them so dangerous?

The Vulnerability is exploited before the software developer has the opportunity to provide a solution for it.

BYOD (bring your own device)

The practice of allowing users to use their own personal devices to connect to an organizational network.

Port Scanning

Type of scanning that might identify the Telnet is running on a server.

A C L (access control list):

Used by routers to decline forwarding certain packets Acts like a filter to instruct the router to permit or deny traffic according to one or more of the following variables: Network layer protocol (e.g., IP or I C M P) Transport layer protocol (e.g., T C P or U D P) Source IP address Destination IP address T C P or U D P port number

Honeypot

Vulnerable computer that is set up to entice an intruder to break into it

application awareness

Which NGFW feature allows a network admin to restrict traffic generated by a specific game?

What features is common to both an NGFW and traditional firewalls?

application control

what kind of firewall blocks traffic based on application data contained within the packets?

contenting filtering firewall

What do well-chosen subnets accomplish?

network documentation is easier

Two types of agents

non persistent or disolvable and persistent

Intrusion Prevention System (IPS)

software or hardware that monitors patterns in the traffic flow to identify and automatically block attacks

exploit

take advantage of a vulnerability

Which of the following is not a good reason to segment a network?

to increase the number of networking devices

2FA

two-factor authentication--requires something you provide and something you know.

Three types of attack simulations

vulnarbility scanning, penetration testing and red team- blue team exercise

What kind of ticket is help by KErbero's TGS?

wireless


Set pelajaran terkait

Legal Implications in Nursing Practice

View Set

Learning System RN: Med Surg Final!!!!!!!!

View Set

Immediate vs. Deferred Annuities

View Set

ati pharm 4.0 test pain and inflammation

View Set

Chapter 14: Types and Characteristics of Pooled Investments

View Set

Chapter 19: Family-Centered Care of the Child During Illness and Hospitalization 26Qw/exp

View Set

CompTIA Advanced Security Practitioner (CASP)- CAS-002 Domain 1 CH 3 Network and Security Components, Concepts and Architectures - Terms

View Set

Exam 2 - Mental Health Questions

View Set

Solving Equations, and Inequalities Practice

View Set

Series 63 Mastery Exam with all choices on cards

View Set