Term
When an attempt is made to access another users account or network through unwarranted means it is termed as an ___________. |
|
Definition
|
|
Term
What part of the network is known as the Demilitarized Zone (DMZ)? |
|
Definition
Anywhere in between the wide open Internet and the corporate Internal Network. |
|
|
Term
It is a form of trust exploitation. Access is established by untrustworthy sources by using a machine which has access to the internal network. |
|
Definition
|
|
Term
In these kind of cases the hacker listens for network traffic and data interceptions. Once the transmission has been intercepted, the untrustworthy host positions itself between the two communicating hosts. |
|
Definition
|
|
Term
In this kind of attack, the hacker surveys a network and collects enough information to launch an attack. |
|
Definition
|
|
Term
A echo re quest can be sent to multiple host IP addresses by a __________ tool. These can be sent all at the same time. |
|
Definition
|
|
Term
It is software program which surveys a host network for open ports. An open port means a chance for a hacker to use the port and application information to determine how to attack. |
|
Definition
|
|
Term
What port number(s) are used by FTP? |
|
Definition
|
|
Term
What port number(s) are used by Telnet? |
|
Definition
|
|
Term
What port number(s) are used by SMTP? |
|
Definition
|
|
Term
What port number(s) are used by DNS (Zone Transfers)? |
|
Definition
|
|
Term
What port number(s) are used by HTTP? |
|
Definition
|
|
Term
What port number(s) are used by POP3? |
|
Definition
|
|
Term
What port number(s) are used by NNTP? |
|
Definition
|
|
Term
What port number(s) are used by HTTPS? |
|
Definition
|
|
Term
What port number(s) are used by DHCP? |
|
Definition
|
|
Term
What port number(s) are used by DNS (Name Resolution)? |
|
Definition
|
|
Term
What port number(s) are used by TFTP? |
|
Definition
|
|
Term
What port number(s) are used by NTP? |
|
Definition
|
|
Term
What port number(s) are used by SNMP? |
|
Definition
|
|
Term
_____________ can be sent using the internet to resolve hostnames from IP addresses and the other way round. |
|
Definition
|
|
Term
In a _________ attack, A spoofed up IP address is used to send a request to a device and the system from which the attack has been initiated does not acknowledge the resulting SYN-ACK. This causes the session to cease and it stops taking new connection requests. |
|
Definition
|
|
Term
In a _________ attack, multiple broadcast ping requests are made to a single target from a spoofed IP address. |
|
Definition
|
|
Term
What are the three services that comprise AAA? |
|
Definition
Authentication, Authorization, and Accounting |
|
|
Term
______ is a list of statements permitted and denied which can be applied to a Cisco device. |
|
Definition
|
|
Term
This protocol is responsible for synchronizing clocks on the local network. |
|
Definition
|
|
Term
This can be both a software or a hardware. It is installed to separate a trusted network from a network which is less trusted, for example the Internet. |
|
Definition
|
|
Term
___ is a device which listens to all traffic that is coming in to be able to identify the attack. It is inline with the traffic path on a network. It works with firewall. Together they modify the rule templates to block traffic from the address or addresses of the attacker. |
|
Definition
|
|
Term
It is a device which is passive in nature. It may not be inline with the traffic path on a network. Just like IPS it too listens promiscuously to all incoming traffic. It does so to record and generate alerts. |
|
Definition
|
|