Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
43 Cards in this Set
- Front
- Back
What does echo do?
|
responds to packets on UDP port 7
|
|
What does chargen do?
|
responds to packets on UDP port 19 with random characters
|
|
What is an FTP bounce?
|
running scans against other computers through a vulnerable FTP server
|
|
What version of BIND allows for mutual authentication?
|
BINDv9
|
|
What ports are commonly used for NetBIOS names and sessions?
|
TCP/UDP 137, 138, 139
|
|
What ports do DHCP and BOOTP use?
|
TCP/UDP ports 67 and 68
|
|
What port does NNTP use?
|
TCP/UDP 119
|
|
What port does LDAP use?
|
TCP/UDP port 389
|
|
What port does LDAPS use?
|
TCP/UDP port 636
|
|
Why can hand geometry only be used for verification, rather than identification?
|
hand geometry is not unique
|
|
What advantages do hand geometry scans have over fingerprint scans?
|
they are faster, cleaner, and less invasive
|
|
What are the advantages and disadvantages of retinal scanning?
|
most reliable but most invasive
|
|
What disadvantage does speech recognition have?
|
easier to spoof than other biometric techniques
|
|
What are QIC tapes primarily used for?
|
backing up standalone computers
|
|
What are DAT drives primarily used for?
|
basic network backups
|
|
What three tape types offer high capacity and rapid data transfer?
|
8mm, DLT, and LTO
|
|
How does a host respond to a TCP connect scann if the scanned port is open? Closed?
|
open: SYN-ACK; closed: RST
|
|
What can be done to reduce the effects of half-open attacks?
|
reduce the time a port waits for a response
|
|
How does a host respond to a FIN packet if the scanned port is open? Closed?
|
open: packet discarded; closed: RST
|
|
How does an XMAS scan work?
|
a variety of TCP packets are sent to elicit a response
|
|
What TCP sequence number does an XMAS scan use?
|
0
|
|
What are two characteristics of a null scan?
|
TCP sequence number set to 0; no TCP flags set
|
|
What is a TCP ACK scan used for?
|
determining if a port is filtered by a firewall
|
|
What is a window scan?
|
a scan that attempts to determine the OS in use by its default TCP window size
|
|
What are the two basic types of DoS attacks?
|
flaw exploitation attacks and flooding attacks
|
|
What three basic router/firewall measures will reduce the effects of a DoS attack?
|
egress filtering, ingress filtering, and disabling IP-directed broadcasting
|
|
What is source routing?
|
Sender defines hops a packet must travel through
|
|
How is source routing used by attackers?
|
used to route packets around security devices
|
|
How can source routing be defended against?
|
routers can be configured to discard source-routed packets
|
|
What two methods do IDS's use to detect and analyze attacks?
|
misuse detection and anomoly detection
|
|
What advantage does LEAP have over EAP?
|
LEAP allows for mutual authentication
|
|
What advantage does LEAP have over EAP?
|
LEAP allows for mutual authentication
|
|
What protocol does 802.1x use for authentication?
|
EAP
|
|
What protocol does 802.1x use for authentication?
|
EAP
|
|
How does an 802.1x authenticator handle authentication traffic?
|
Passes it to a RADIUS server for authentication
|
|
What is ECC?
|
Elliptical Curve Cryptography- public-key cryptographic method which generates smaller, faster, and more secure keys
|
|
What standard is LDAP based on?
|
X500
|
|
Who developed SSL?
|
Netscape
|
|
What three protocols are routinely layered over TLS?
|
IMAP, POP3, and SMTP
|
|
What two types of certificates does S/MIME use?
|
PKCS #7 certificates for message content and X.509v3 for source authentication
|
|
What is the "hidden node" problem?
|
When a wireless client cannot see the network due to interference.
|
|
What does WEP stand for?
|
Wired Equivalent Protection
|
|
In a 128-bit WEP key, how long is the actual secret key?
|
104 bits- the first 24 bits are used for the Initialization Vector (IV)
|