Shared Flashcard Set

Details

CCNA 840-822 Chapter 6
Identify security threats to a network and describe general methods to mitigate those threats
29
Computer Networking
Professional
05/22/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
When an attempt is made to access another users account or network through unwarranted means it is termed as an ___________.
Definition
access attack
Term
What part of the network is known as the Demilitarized Zone (DMZ)?
Definition
Anywhere in between the wide open Internet and the corporate Internal Network.
Term
It is a form of trust exploitation. Access is established by untrustworthy sources by using a machine which has access to the internal network.
Definition
Port Redirection
Term
In these kind of cases the hacker listens for network traffic and data interceptions. Once the transmission has been intercepted, the untrustworthy host positions itself between the two communicating hosts.
Definition
Man in the Middle attack
Term
In this kind of attack, the hacker surveys a network and collects enough information to launch an attack.
Definition
Recon attacks
Term
A echo re quest can be sent to multiple host IP addresses by a __________ tool. These can be sent all at the same time.
Definition
ping sweep
Term
It is software program which surveys a host network for open ports. An open port means a chance for a hacker to use the port and application information to determine how to attack.
Definition
Port Scans
Term
What port number(s) are used by FTP?
Definition
TCP 20/21
Term
What port number(s) are used by Telnet?
Definition
TCP 23
Term
What port number(s) are used by SMTP?
Definition
TCP 25
Term
What port number(s) are used by DNS (Zone Transfers)?
Definition
TCP 53
Term
What port number(s) are used by HTTP?
Definition
TCP 80
Term
What port number(s) are used by POP3?
Definition
TCP 110
Term
What port number(s) are used by NNTP?
Definition
TCP 119
Term
What port number(s) are used by HTTPS?
Definition
TCP 443
Term
What port number(s) are used by DHCP?
Definition
UDP 67,68
Term
What port number(s) are used by DNS (Name Resolution)?
Definition
UDP 53
Term
What port number(s) are used by TFTP?
Definition
UDP 69
Term
What port number(s) are used by NTP?
Definition
UDP 123
Term
What port number(s) are used by SNMP?
Definition
UDP 161
Term
_____________ can be sent using the internet to resolve hostnames from IP addresses and the other way round.
Definition
Information queries
Term
In a _________ attack, A spoofed up IP address is used to send a request to a device and the system from which the attack has been initiated does not acknowledge the resulting SYN-ACK. This causes the session to cease and it stops taking new connection requests.
Definition
TCP SYN
Term
In a _________ attack, multiple broadcast ping requests are made to a single target from a spoofed IP address.
Definition
smurf
Term
What are the three services that comprise AAA?
Definition
Authentication, Authorization, and Accounting
Term
______ is a list of statements permitted and denied which can be applied to a Cisco device.
Definition
ACL
Term
This protocol is responsible for synchronizing clocks on the local network.
Definition
NTP
Term
This can be both a software or a hardware. It is installed to separate a trusted network from a network which is less trusted, for example the Internet.
Definition
Firewall
Term
___ is a device which listens to all traffic that is coming in to be able to identify the attack. It is inline with the traffic path on a network. It works with firewall. Together they modify the rule templates to block traffic from the address or addresses of the attacker.
Definition
IPS
Term
It is a device which is passive in nature. It may not be inline with the traffic path on a network. Just like IPS it too listens promiscuously to all incoming traffic. It does so to record and generate alerts.
Definition
IDS
Supporting users have an ad free experience!