Term
| When an attempt is made to access another users account or network through unwarranted means it is termed as an ___________. |
|
Definition
|
|
Term
| What part of the network is known as the Demilitarized Zone (DMZ)? |
|
Definition
| Anywhere in between the wide open Internet and the corporate Internal Network. |
|
|
Term
| It is a form of trust exploitation. Access is established by untrustworthy sources by using a machine which has access to the internal network. |
|
Definition
|
|
Term
| In these kind of cases the hacker listens for network traffic and data interceptions. Once the transmission has been intercepted, the untrustworthy host positions itself between the two communicating hosts. |
|
Definition
|
|
Term
| In this kind of attack, the hacker surveys a network and collects enough information to launch an attack. |
|
Definition
|
|
Term
| A echo re quest can be sent to multiple host IP addresses by a __________ tool. These can be sent all at the same time. |
|
Definition
|
|
Term
| It is software program which surveys a host network for open ports. An open port means a chance for a hacker to use the port and application information to determine how to attack. |
|
Definition
|
|
Term
| What port number(s) are used by FTP? |
|
Definition
|
|
Term
| What port number(s) are used by Telnet? |
|
Definition
|
|
Term
| What port number(s) are used by SMTP? |
|
Definition
|
|
Term
| What port number(s) are used by DNS (Zone Transfers)? |
|
Definition
|
|
Term
| What port number(s) are used by HTTP? |
|
Definition
|
|
Term
| What port number(s) are used by POP3? |
|
Definition
|
|
Term
| What port number(s) are used by NNTP? |
|
Definition
|
|
Term
| What port number(s) are used by HTTPS? |
|
Definition
|
|
Term
| What port number(s) are used by DHCP? |
|
Definition
|
|
Term
| What port number(s) are used by DNS (Name Resolution)? |
|
Definition
|
|
Term
| What port number(s) are used by TFTP? |
|
Definition
|
|
Term
| What port number(s) are used by NTP? |
|
Definition
|
|
Term
| What port number(s) are used by SNMP? |
|
Definition
|
|
Term
| _____________ can be sent using the internet to resolve hostnames from IP addresses and the other way round. |
|
Definition
|
|
Term
| In a _________ attack, A spoofed up IP address is used to send a request to a device and the system from which the attack has been initiated does not acknowledge the resulting SYN-ACK. This causes the session to cease and it stops taking new connection requests. |
|
Definition
|
|
Term
| In a _________ attack, multiple broadcast ping requests are made to a single target from a spoofed IP address. |
|
Definition
|
|
Term
| What are the three services that comprise AAA? |
|
Definition
| Authentication, Authorization, and Accounting |
|
|
Term
| ______ is a list of statements permitted and denied which can be applied to a Cisco device. |
|
Definition
|
|
Term
| This protocol is responsible for synchronizing clocks on the local network. |
|
Definition
|
|
Term
| This can be both a software or a hardware. It is installed to separate a trusted network from a network which is less trusted, for example the Internet. |
|
Definition
|
|
Term
| ___ is a device which listens to all traffic that is coming in to be able to identify the attack. It is inline with the traffic path on a network. It works with firewall. Together they modify the rule templates to block traffic from the address or addresses of the attacker. |
|
Definition
|
|
Term
| It is a device which is passive in nature. It may not be inline with the traffic path on a network. Just like IPS it too listens promiscuously to all incoming traffic. It does so to record and generate alerts. |
|
Definition
|
|