Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/43

Click to flip

43 Cards in this Set

  • Front
  • Back
What does echo do?
responds to packets on UDP port 7
What does chargen do?
responds to packets on UDP port 19 with random characters
What is an FTP bounce?
running scans against other computers through a vulnerable FTP server
What version of BIND allows for mutual authentication?
BINDv9
What ports are commonly used for NetBIOS names and sessions?
TCP/UDP 137, 138, 139
What ports do DHCP and BOOTP use?
TCP/UDP ports 67 and 68
What port does NNTP use?
TCP/UDP 119
What port does LDAP use?
TCP/UDP port 389
What port does LDAPS use?
TCP/UDP port 636
Why can hand geometry only be used for verification, rather than identification?
hand geometry is not unique
What advantages do hand geometry scans have over fingerprint scans?
they are faster, cleaner, and less invasive
What are the advantages and disadvantages of retinal scanning?
most reliable but most invasive
What disadvantage does speech recognition have?
easier to spoof than other biometric techniques
What are QIC tapes primarily used for?
backing up standalone computers
What are DAT drives primarily used for?
basic network backups
What three tape types offer high capacity and rapid data transfer?
8mm, DLT, and LTO
How does a host respond to a TCP connect scann if the scanned port is open? Closed?
open: SYN-ACK; closed: RST
What can be done to reduce the effects of half-open attacks?
reduce the time a port waits for a response
How does a host respond to a FIN packet if the scanned port is open? Closed?
open: packet discarded; closed: RST
How does an XMAS scan work?
a variety of TCP packets are sent to elicit a response
What TCP sequence number does an XMAS scan use?
0
What are two characteristics of a null scan?
TCP sequence number set to 0; no TCP flags set
What is a TCP ACK scan used for?
determining if a port is filtered by a firewall
What is a window scan?
a scan that attempts to determine the OS in use by its default TCP window size
What are the two basic types of DoS attacks?
flaw exploitation attacks and flooding attacks
What three basic router/firewall measures will reduce the effects of a DoS attack?
egress filtering, ingress filtering, and disabling IP-directed broadcasting
What is source routing?
Sender defines hops a packet must travel through
How is source routing used by attackers?
used to route packets around security devices
How can source routing be defended against?
routers can be configured to discard source-routed packets
What two methods do IDS's use to detect and analyze attacks?
misuse detection and anomoly detection
What advantage does LEAP have over EAP?
LEAP allows for mutual authentication
What advantage does LEAP have over EAP?
LEAP allows for mutual authentication
What protocol does 802.1x use for authentication?
EAP
What protocol does 802.1x use for authentication?
EAP
How does an 802.1x authenticator handle authentication traffic?
Passes it to a RADIUS server for authentication
What is ECC?
Elliptical Curve Cryptography- public-key cryptographic method which generates smaller, faster, and more secure keys
What standard is LDAP based on?
X500
Who developed SSL?
Netscape
What three protocols are routinely layered over TLS?
IMAP, POP3, and SMTP
What two types of certificates does S/MIME use?
PKCS #7 certificates for message content and X.509v3 for source authentication
What is the "hidden node" problem?
When a wireless client cannot see the network due to interference.
What does WEP stand for?
Wired Equivalent Protection
In a 128-bit WEP key, how long is the actual secret key?
104 bits- the first 24 bits are used for the Initialization Vector (IV)