Term
|
Definition
type of packet flood that allows attackers to amplify their bandwidth |
|
|
Term
Smurf attack is also know as what? |
|
Definition
Directed Broadcast attack |
|
|
Term
What command remotly boots computers via the network? |
|
Definition
|
|
Term
|
Definition
Access list that adds or restricts access to router |
|
|
Term
What does "Access-list 101permit IP 0.0.0.0 255.255.255.255" mean? |
|
Definition
Wild card that permit IP any any |
|
|
Term
What can you use to copy configurations from your router remotly? |
|
Definition
|
|
Term
|
Definition
System logs sent to a specific server via IP address |
|
|
Term
What command do you use to check your router IOS version? |
|
Definition
|
|
Term
What command do you use to get access to the privileged EXEC mode, which is sometimes called the "enable mode"? |
|
Definition
Typing enable at the EXEC mode prompt. |
|
|
Term
What is the command to enter the global configuration mode? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Authentication, Authorization, and Accounting |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What is the best way to change ownership? |
|
Definition
|
|
Term
|
Definition
The default permissions given. 022 |
|
|
Term
|
Definition
manually entered into the router and defines the path to the remote network |
|
|
Term
|
Definition
uses information from other routers to create routes |
|
|
Term
What is Cisco Discovery Protocol? |
|
Definition
used by Cisco routers to exchange information, such as platform information and status, with each other |
|
|
Term
|
Definition
allows a packet to dictate the path it takes through a routed network |
|
|
Term
|
Definition
Secure Copy Protocol, Protocol used for loading and saving router configurations and provide integrity and confidentiality. |
|
|
Term
What are the steps to Penetration Testing? |
|
Definition
Internal testing External testing |
|
|
Term
What makes Identification of switches a little more dificult? |
|
Definition
Switches do not always have IP address assigned to them. |
|
|
Term
Properly configured routers will not have what? |
|
Definition
TCP and UDP ports open to the internet, as well as no response to ICMP echo request packets |
|
|
Term
|
Definition
(Network Mapper) is a security scanner used to discover Host and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses. |
|
|
Term
|
Definition
Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managing devices on IP networks." Devices typically supported include routers, switches, servers, workstations, printers, modem racks, and more." |
|
|
Term
Can Ettercap be used to directly attack a devise? |
|
Definition
|
|
Term
What is Role-based Access Control List (ACL)? |
|
Definition
Permission for a particular SID to access the resource is determined and authorized through the ACL. |
|
|
Term
What are you configuring with Security Configuration Wizard (SCW)? |
|
Definition
Configuring authentication on Windows Server 2003 SP1 |
|
|
Term
Server 2003 authentication is based on what? |
|
Definition
At least on of the following, Password PIN Smart card Token Biometrics |
|
|
Term
What is the Audit Policy? |
|
Definition
can be set so user or system activity in specific categories is recorded. |
|
|
Term
What is the command to enter the global configuration mode? |
|
Definition
|
|
Term
What are 2 types of named access lists? |
|
Definition
Extended (config -ext -n) Standars (config -std -n) |
|
|
Term
|
Definition
Authentication, Authorization, and Accounting |
|
|
Term
What kind of notices might you see on a Login Banner? |
|
Definition
|
|
Term
What command would you use to list how many virtual terminals your IOS has? |
|
Definition
|
|
Term
How many different privilege levels does CISCO IOS provide? |
|
Definition
|
|
Term
What level is User EXEC mode run? |
|
Definition
|
|
Term
What level is privileged EXEC mode run? |
|
Definition
|
|
Term
What command do you use to make your password a secret? |
|
Definition
|
|
Term
|
Definition
The Console and Auxiliary ports on Cisco routers are used for serial connections to the router. |
|
|
Term
|
Definition
A database used to translate, or resolve, fully qualified domain names (FQDN) into IP addresses and vise versa. |
|
|
Term
|
Definition
service configured to start automatically in the Infrastructure template for all three security environments |
|
|
Term
What is an option to be chosen through the SCW, depending on the level of information to be included within it? |
|
Definition
|
|
Term
|
Definition
Multipurpose Internet Mail Extensions, consistency checks stricter rules, Windows explorer web server |
|
|
Term
What provides standardized settings for the three classes of environments and what are they? |
|
Definition
Windows XP Security Guide templates
enterprise clients high security stand-alone environments |
|
|
Term
|
Definition
set so user or system activity in specific categories is recorded |
|
|
Term
|
Definition
show if administrator rights and permission are accessed or if an abuse of these rights is identified. |
|
|
Term
What is group membership? |
|
Definition
the means by which Windows implements security throughout the network |
|
|
Term
What are the two types of groupes that Windows supports? |
|
Definition
Security Group Distribution Group |
|
|
Term
What is the AD Group Policy? |
|
Definition
The tool used to manage Security policies or settings that are implemented at the domain level |
|
|
Term
What is Property of Transitivity? |
|
Definition
refers to a logical trust relationship between three domains |
|
|
Term
What is the Property Direction in Trust? |
|
Definition
refers to the direction of trust flow between domains. |
|
|
Term
What is a Domain Controller Baseline policy? |
|
Definition
provides the basis for security configuration settings such as audit policy, security options, user rights assignments, and event log settings |
|
|
Term
What is the security.inf file? |
|
Definition
Specifies default security settings |
|
|
Term
When was the Security Configuration Wizard (SCW) first used? |
|
Definition
with Windows Server 2003 SP1 |
|
|
Term
What was The Gold Disk software designed to provide? |
|
Definition
the capability for the detection remediation and reporting of vulnerabilities on Windows-based systems and applications. |
|
|
Term
|
Definition
manages system resources and communicates instructions to both hardware and software. modular |
|
|
Term
What are the classes of routing protocols? |
|
Definition
distance vector, link state, and hybrid |
|
|
Term
Can ACLs be defined without applying them? |
|
Definition
|
|
Term
The Audit Trail shows what? |
|
Definition
admin rights and abuse of those rights |
|
|
Term
|
Definition
Windows Server Update Servers |
|
|
Term
|
Definition
Solves communication problems that occur between LINUX and Windows |
|
|
Term
What is the command to remove a directory? |
|
Definition
|
|
Term
What command is used to switch users? |
|
Definition
|
|
Term
What command is used to list full path of working directory? |
|
Definition
|
|
Term
What command is used to switch into the graphical user interface,? |
|
Definition
|
|
Term
what interface is used to boot in command mode? |
|
Definition
|
|
Term
What is a freely available tool that can be found on the internet? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
What are some other uses for samba? |
|
Definition
Support ACL's on printer and file shares Engage in NetBIOS browsing Become a master browser for Windows network |
|
|
Term
|
Definition
|
|
Term
|
Definition
Roll Based Access Control |
|
|
Term
What Database stores all Active Directory objects? |
|
Definition
|
|
Term
What port is prone to War Dialing? |
|
Definition
|
|
Term
Distance Vector Protocol would be the same as what? |
|
Definition
OSPF (open Shortest Path First |
|
|