Security+ SY0-601: Network Security Design & Implementation

Ace your homework & exams now with Quizwiz!

Port Ranges

- 0 - 1,023: Well known ports - 1,024 - 49,151: registered ports -49,152 - 65,535: dynamic ports

Network Ports

- 16 bit binary numbers - 65,536 possible values - allowable range 0-65,535

WPA2

- Encrypts with AES - Uses CCMP - Contains some vulnerabilities

Routers, Switches, and Bridges

- Normally Work at Layer 2 - Some switches work at Layer 3

WPA3

- Supports CCMP Uses SAE key exchange

POP Port

110

NetBIOS Port

137-139

Which one of the following ports is not normally used by email systems? 143 25 139 110

139

IMAP Port

143

FTP Port

21

SSH Port

22

SMTP Port

25

RDP Port

3389

HTTPS Port

443

HTTP Port

80

DNS Sinkhole

A DNS server that gives out a false result for a domain name.

Always On VPN

A VPN that allows the user to always stay connected instead of connecting and disconnecting from it.

tcpdump

A command-line protocol analyzer. Administrators use it to capture packets.

Proxy Server

A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.

honeyfiles

A file pretending to be legitimate, in order to detect malicious activity.

nmap

A network utility designed to scan a network and create a map. Frequently used as a vulnerability scanner.

nessus

A network-vulnerability scanner available from Tenable Network Security.

IP address

A number assigned to any item that is connected to the Internet. Separated by the network address and host address.

Zero Trust

A security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network.

Jump Box

A server that is used to access devices that have been placed in a secure network zone, such as a DMZ. The server spans the two networks to provide access from an administrative desktop to the managed device.

VPN concentrator

A single device that incorporates advanced encryption and authentication methods in order to handle a large number of VPN tunnels.

tcpreplay

A suite of free open source utilities for editing and replaying previously captured network traffic

SYN Flood

A type of DoS where an attacker sends a large amount of SYN request packets to a server in an attempt to deny service.

SSL VPN

A type of VPN that uses SSL encryption. Clients connect to the VPN server using a standard Web browser, with the traffic secured using SSL. The two most common types of SSL VPNs are SSL portal VPNs and SSL tunnel VPNs.

WPS (Wi-Fi Protected Setup)

A user-friendly—but not very secure—security setting available on some consumer-grade APs. Part of the security involves requiring a PIN in order to access the AP's settings or to associate a new device with the network. The PIN can be easily cracked through a brute force attack, so this PIN feature should be disabled if possible.

Remote Access VPN

A user-to-LAN virtual private network connection used by remote users.

Site to site VPN

A virtual private network in which multiple sites can connect to other sites over the Internet.

Evil Twin

A wireless network with the same name as another wireless access point. Users unknowingly connect to the evil twin; hackers monitor the traffic looking for useful information.

SDN (Software Defined Networking)

Ability to control and manage network infrastructure programmatically and holistically. Networking devices have two functional planes of operation (control plane, data plane). Directly Programmable and Agile. Centrally managed, global view.

orphaned rules

Allow access to decommissioned systems and services

SNMP (Simple Network Management Protocol)

An Application-layer protocol used to exchange information between network devices.

static IP address

An IP address that is manually assigned to a device and remains constant until it is manually changed.

Authentication Header (AH)

An IPsec protocol that authenticates that packets received were sent from the source identified in the header of the packet. - Can be used together with ESP

Encapsulating Security Payload (ESP)

An IPsec protocol that provides authentication, integrity, and encryption services.\ - Can be used together with AH

NTP (Network Time Protocol)

An Internet protocol that enables synchronization of computer clock times in a network of computers by exchanging time signals.

thin access point

An access point with limited functionality. (It does not provide authentication or encryption.)

User Data Protocol (UDP)

An alternative to TCP designed to establish low-latency and loss-tolerant connections between applications on the internet.

MAC Flood

An attack that sends numerous packets to the switch, each of which has a different source MAC address, in an attempt to use up the memory on the switch.

DNS poisoning

An attack that substitutes DNS addresses so that the computer is automatically redirected to an attacker's device.

sn1per

An automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities across a network

Split-tunnel VPN

An encrypted connection used with VPN's that only encrypts traffic going to private IP addresses used in the private network.

Honeynet

An entire dummy network used to lure attackers.

wireshark

Application that captures and analyzes network packets

OSI Model

Application, Presentation, Session, Transport, Network, Data Link, Physical

netstat command

Can display a variety of information about IP-based connections on a Windows or UNIX host.

DMZ

Demilitarized Zone

VLAN Trunk Negotiation

Deny the use of automatic VLAN trunk negotiation to limit the effectiveness of VLAN hopping attacks

nslookup command

Displays information about DNS names and their corresponding IP addresses, and it can be used to diagnose DNS servers.(windows)

DNSSEC

Domain Name System Security Extensions. A suite of specifications used to protect the integrity of DNS records and prevent DNS poisoning attacks.

Stateless Firewall

Evaluates each connection independently

WPA (Wireless Protected Access)

Included a new security protocol, Temporal Key Integrity Protocol (TKIP)

Fat Access Point

Intelligent wireless access point that provides everything needed to manage wireless clients. Need to be configured individually.

ICMP

Internet Control Message Protocol. Used for diagnostics such as ping. Many DoS attacks use ICMP. It is common to block ICMP at firewalls and routers. If ping fails, but other connectivity to a server succeeds, it indicates that ICMP is blocked.

IPsec

Internet Protocol Security. Used to encrypt traffic on the wire and can operate in both tunnel mode and transport mode. It uses tunnel mode for VPN traffic. IPsec is built into IPv6, but can also work with IPv4 and it includes both AH and ESP. AH provides authentication and integrity, and ESP provides confidentiality, integrity, and authentication. IPsec uses port 500 for IKE with VPN connections.

VLAN

Layer 2 Requires VLAN Trunking Segments Network

What technology provides the translation that assigns public IP addresses to privately addressed systems that wish to communicate on the Internet? NAT HTTP SSL TLS

NAT

East-West Traffic

Network traffic that traverses systems within a data center.

DHCP snooping

Prevents rogue DHCP servers from impacting the network.

darknets

Private online community that is only open to those who belong to it.

Forward Proxy

Proxy that works on behalf of the client

Reverse Proxy

Proxy that works on behalf of the server

What TCP flag indicates that a packet is requesting a new connection? PSH RST SYN URG

SYN

TCP Flags

SYN, ACK, FIN

Ad Hoc Network

Temporary networks that bypass security controls

IPv6

The Internet Protocol version 6 provides a large number of new addresses to route Internet traffic, using "from" and "to" addresses written as colon-hexadecimal notation, such as "fe80::42:acff:feaa:1bf0".

Stateful Firewall

Tracks open connections

Dennis would like to capture the DNS traffic on his network using Wireshark. What port should he use in his capture filter to restrict his capture to DNS queries and responses? TCP 53 UDP 53 UDP 80 TCP 80

UDP 53

HTML5 VPN

Using features of HTML5 to implement remote desktop/VPN connections via browser software (clientless).

curl command

Utility for command-line manipulation of URL-based protocol requests.

scanless

Utility that runs port scans through third-party websites to evade detection.

Active/passive load balancing

When one server in a load balancing system is active and the others are stand-by.

Active/active load balancing

When servers in a load balancing system are all handling requests.

WEP (Wired Equivalent Privacy)

Wireless security protocol that uses a standard 40-bit encryption to scramble data packets. Does not provide complete end-to-end encryption and is vulnerable to attack.

Transparent Proxy

Work without the client or server knowledge

Shadowed rules

a rule that will never be executed because of the placement in the rule base

rogue access point

a wireless access point that gives unauthorized access to secure networks.

Static Port Security

admin manually configures valid MAC adresses for each port

Full-tunnel VPN

all traffic goes through the encrypted tunnel while the user is connected to the VPN

Promiscuous rules

allow more access than necessary

Dynamic Host Configuration Protocol (DHCP)

allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network

netcat command

can read or write information to the network. can be used to create an open connection on a device or to access a connection on a remote machine.

North-South Traffic

client to server traffic, between the data center and the rest of the network

honeypots

false targets for computer criminals to attack

Which one of the following devices would not typically be found in a DMZ? load balancer web server file server SSL accelerator

file server

Ricky would like to separate his network into three distinct security zones. Which one of the following devices is best suited to that task? IPS firewall router switch

firewall

nc command

ioens raw network connections on mac and linux

Port Security

limit the devices that may connect to a network by MAC address

VLAN Pruning

limiting a VLANs ability to be transmitted on a trunk link.

ss command

linux network stats

cuckoo

malware analysis tool

the harvestor

mines the internet for domain information

dig command

performs DNS lookup for linux and mac

What command sends ICMP Echo Request packets? ftp telnet ping ssh

ping

Which one of the following devices carries VLANs on a network? router switch firewall hub

switch

Dynamic Port Security

switches memorize the first MAC address they see on each port and limit access to that address


Related study sets

ARHI Quiz 4 (Lectures 18-22) WORKS

View Set

Chapter 14 #4: Africa: The Slave Trade (pp. 338-339)

View Set

Economics Unit Exams 1-5 Primavera

View Set