• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/42

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

42 Cards in this Set

  • Front
  • Back
A back door attack is usually a?
Acess or Modification attack
SSH uses what port for connections
22 and TCP
is a whole idsk encryption feature that can encrypt an entire volume iwht 128-bit encryption
Bitlocker
allows a transport protocol to be sent acrross the network and utilized by the equivalent service or protocol at the receiving host
Encapsulation
Originally designed by MIT, it is becoming very popular as an authentication method.
Kerberos
are programs or snippets of code the execute when a certain predefined event occurs
Logic bomb
Two particular areas of interset with web servers are filters and controlling access to
Executable scripts
Occur when an attacker takes control of one end of a TCP session
TCP Sequence number attacks
is a facility designed to provide immdiate availability in the event of a system or network failure
Hot site
is the process of systematically identifying the network and its security proture
Footprinting
Allow you to isolate systems from unauthorized users
Security zones
can be thought of as an intermedicary between your network and any other network
Proxy firewall
cards that are difficult to counterfeit, but they're easy to steal
Smart cards
is a feature designed into many e-mail servers that allows them to forward e-mail to ther e-mail servers
SMTP Relay
The most difficult part of the process is attempting to assign values to information
Asset-identification
is a form of social engineering in which you simply ask someone for a piece of information that you are missing by making it look as if it is a legitimate request.
Phishing
The purpose of this is to identify and evaluate the enemy, identify and track communication patterns, and identify what type of technology are being used to send them.
Analysis and intelligence
This model is common in network administrative roles.
Role-based access control or Rbac
is a newer protocol that merges SSL with other protocols to provide encryption.
TLS
Attacks on TCP/IP usually occur at what layer,
HOST-TO-HOST or INTERNET layer
are software programs that have the ability to hide certain things from the operating system.
Rootkits
a device that has some of the best capabilities of routers and hubs combined.
Switch
it draws attackers away from a higher-value system or allows administrators to gain intelligence about an attack strategy.
Honeypots
are freestanding devices that operate in a largely self-contained manner, requiring less maintenance and support than a server-based product
Appliances
A system that uses smart cards and passwords is referred to as a
TWO-FACTOR authentication system
are common in an IDS environment and may be the result of unusual traffic in the network.
False positives
occur when an application receives more data than it’s programmed to accept.
Buffer overflow
differs from other malware in that it works often actively on behalf of a third party
Spyware
MAC uses this to identify the level of security that applies to objects
LABELS
are your first line of defense, and they must be configured to pass only traffic that is authorized by the network administrators.
Routers
Two primary methods use ICMP to disrupt systems:
SMURF attacks and ICMP tunneling.
can use multiple public IP addresses
NAT
uses a single one and shares the port with the network.
PAT
are a combination of the IP address and the port
Sockets
is an occurrence in a data source that indicates that a suspicous activity has occurred
event
involves trying to get access to your system from an attacker's perspective
penetration testing
viruses change for in order to avoid detection
polymorphic
works by encapsulating the network traffic in a protocol called Network Control Protocol (NCP)
PPP
Any wireless access point added to your network that has not been authorized is considered a
Rouge
help in identifying what services are running on a network.
Port scan
process of making a workstation or server more secure is
Platform hardening
exists to detect and report unusual occurrences in a network, not block them.
IDS