Term
|
Definition
gathering information to launch malicious packets at a target network. |
|
|
Term
What is site reconnaissance? |
|
Definition
retrieving info directly from target |
|
|
Term
What is social engineering? |
|
Definition
Con to gain access to privledged information |
|
|
Term
What type of information is given away freely? |
|
Definition
|
|
Term
What is a good starting point for mapping IP addresses to target organization? |
|
Definition
|
|
Term
what does ARIN stand for? |
|
Definition
American Registry for Internet Numbers |
|
|
Term
|
Definition
Maintains information about the IP allocations assigned to particular organizations. |
|
|
Term
What are Zone Transfers in relation to DNS? |
|
Definition
polls the main database for updated information and then transfers if needed |
|
|
Term
|
Definition
activities that hackers use to gather information about a target network. |
|
|
Term
What type of reconnaissance was used in the movie War Games? |
|
Definition
|
|
Term
What does ICMP stand for? |
|
Definition
Internet Controlled Message Protocal |
|
|
Term
|
Definition
Validates networked systems and maps topology |
|
|
Term
|
Definition
Ping TCP ports to verify open ports |
|
|
Term
Is it good practice to block inbound pings? |
|
Definition
|
|
Term
|
Definition
The process of connecting to a system on a specific port and examining the banner provided by the application listening on that port. |
|
|
Term
What does enumeration mean? |
|
Definition
The extraction of user names, machine names, network resources, shares and services. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What is DNS Zone Transfer? |
|
Definition
Zone Transfer to retrieve details of nonpublic internal networks and other useful information to help build accurate map of network. |
|
|
Term
What are BIND Vulnerabilities? |
|
Definition
overflow attacks and DoS attacks |
|
|
Term
What does BIND stand for? |
|
Definition
Berkeley Internet Name Daemon |
|
|
Term
|
Definition
Service commonly found listening on TCP port 79 of Cisco IOS routers that uses telnet |
|
|
Term
|
Definition
listens on port 113 to provide a degree of authentication through mapping local usernames to TCP Network ports |
|
|
Term
What is an information system firewall? |
|
Definition
protects internal network from external networks. |
|
|
Term
|
Definition
sends SYN pack and responds w/ SYN/ACK when open and RST/ACK when closed |
|
|
Term
|
Definition
if closed response is RST |
|
|
Term
|
Definition
used to determine firewall rulesets, statefull and will reject ACK |
|
|
Term
|
Definition
disables all flags, RST for all closed ports |
|
|
Term
|
Definition
identify remote procedure call(RPC) and their associated program and version number |
|
|
Term
|
Definition
TCP port 113, Responds with ID of user that owns process. |
|
|
Term
What is Flie System Hacking? |
|
Definition
Hostile and Self-Replicating Code |
|
|
Term
|
Definition
Gains access to the Shell |
|
|
Term
What is Traffic Capture also known as? |
|
Definition
|
|
Term
What is a state based attack? |
|
Definition
incorporate a variety of exploits that appropriate OS or application facilities for session tracking |
|
|
Term
What is Denial of service? |
|
Definition
Complement to system penetration and encompasses a veriety of techniques designed to deny users or clients access |
|
|
Term
What is multi-homed device? |
|
Definition
Device that is based on a configuration of multi network interfaces. |
|
|
Term
What is an application filtering firewall? |
|
Definition
intercepts connections and performs security inspections. |
|
|
Term
|
Definition
A type of firewall that implements both network-layer and application layer |
|
|
Term
What are the major types of personal firewalls? |
|
Definition
Personal Firewalls Packet Filtering Proxy servers Circuit-level Stateless inspection Stateful inspection |
|
|
Term
|
Definition
|
|
Term
|
Definition
Created between two packet filter routers |
|
|
Term
What should you do when you create a new rule for a firewall? |
|
Definition
|
|
Term
What is it called when an IP address is combined with a port number? |
|
Definition
|
|
Term
When using proxies, what does not exist between the server and client? |
|
Definition
|
|
Term
What is the Proxy Process? |
|
Definition
1. Proxy allows the request 2. New packet is created and has the IP address of the proxy server 3. Web server receives the request 4. Web page is returned to the host (proxy server) 5. Proxy server checks the rule sets to verify that the web page is permitted 6. Decision is made to allow or deny 7. If allowed, the proxy creates a new information packet and delivers it to the original client |
|
|
Term
How many editions are there for ISA server? |
|
Definition
|
|
Term
What are the editions for the ISA server? |
|
Definition
|
|
Term
What is the minimum requirement for installing ISA server 2004? |
|
Definition
|
|
Term
What is used to configure the Microsoft Windows XP Firewall? |
|
Definition
|
|
Term
What information can be found in the audit trail? |
|
Definition
login, logouts, file manipulation and privileged actions, event name, date and time, success and failure rates, program, files accessed and user name. |
|
|
Term
What is a hybrid Firewall? |
|
Definition
combines both packet filtering with application-level firewall techniques |
|
|
Term
Firewalls don't protect against what? |
|
Definition
as access restrictions, back-doors threats, and vulnerability to inside hackers. |
|
|
Term
What do firewalls filter? |
|
Definition
Potentially harmful incoming or outgoing traffic or connections |
|
|
Term
What is a way for a malicious insider to avoid or circumvent a firewall? |
|
Definition
|
|
Term
Tab characters in the syslog are for what? |
|
Definition
ensure the actions in the syslog are separated. |
|
|
Term
An IDS has the ability to do what? |
|
Definition
to sniff individual packets of network traffic for attack signatures and alert the network administrator if intruders have slipped through the firewall. |
|
|
Term
What type of traffic does the IDS report on? |
|
Definition
that the firewall allows it to see |
|
|