Shared Flashcard Set

Details

NSVT2
Navy Course
57
Computer Networking
Not Applicable
01/30/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
What is Reconnaissance?
Definition
gathering information to launch malicious packets at a target network.
Term
What is site reconnaissance?
Definition
retrieving info directly from target
Term
What is social engineering?
Definition
Con to gain access to privledged information
Term
What type of information is given away freely?
Definition
Propriatory Data
Term
What is a good starting point for mapping IP addresses to target organization?
Definition
DNS
Domain Naming System
Term
what does ARIN stand for?
Definition
American Registry for Internet Numbers
Term
What does ARIN do?
Definition
Maintains information about the IP allocations assigned to particular organizations.
Term
What are Zone Transfers in relation to DNS?
Definition
polls the main database for updated information and then transfers if needed
Term
What is mapping targets?
Definition
activities that hackers use to gather information about a target network.
Term
What type of reconnaissance was used in the movie War Games?
Definition
War Dialing
Term
What does ICMP stand for?
Definition
Internet Controlled Message Protocal
Term
What does ICMP do?
Definition
Validates networked systems and maps topology
Term
What is TCP pings?
Definition
Ping TCP ports to verify open ports
Term
Is it good practice to block inbound pings?
Definition
yes
Term
What is banner grabbing?
Definition
The process of connecting to a system on a specific port and examining the banner provided by the application listening on that port.
Term
What does enumeration mean?
Definition
The extraction of user names, machine names, network resources, shares and services.
Term
What does DNS stand for?
Definition
Domain Name System
Term
What port does DNS use?
Definition
TCP and UDP port 53
Term
What is DNS Zone Transfer?
Definition
Zone Transfer to retrieve details of nonpublic internal networks and other useful information to help build accurate map of network.
Term
What are BIND Vulnerabilities?
Definition
overflow attacks and DoS attacks
Term
What does BIND stand for?
Definition
Berkeley Internet Name Daemon
Term
What is finger?
Definition
Service commonly found listening on TCP port 79 of Cisco IOS routers that uses telnet
Term
What is auth?
Definition
listens on port 113 to provide a degree of authentication through mapping local usernames to TCP Network ports
Term
What is an information system firewall?
Definition
protects internal network from external networks.
Term
What is TCP Syn Scans?
Definition
sends SYN pack and responds w/ SYN/ACK when open and RST/ACK when closed
Term
What is TCP Fin Scans?
Definition
if closed response is RST
Term
What is TCP ACK scan?
Definition
used to determine firewall rulesets, statefull and will reject ACK
Term
What is TCP Null scans?
Definition
disables all flags, RST for all closed ports
Term
What is TCP RPC scans?
Definition
identify remote procedure call(RPC) and their associated program and version number
Term
What is Ident Scanning?
Definition
TCP port 113, Responds with ID of user that owns process.
Term
What is Flie System Hacking?
Definition
Hostile and Self-Replicating Code
Term
What is shell Hacking?
Definition
Gains access to the Shell
Term
What is Traffic Capture also known as?
Definition
Sniffing
Term
What is a state based attack?
Definition
incorporate a variety of exploits that appropriate OS or application facilities for session tracking
Term
What is Denial of service?
Definition
Complement to system penetration and encompasses a veriety of techniques designed to deny users or clients access
Term
What is multi-homed device?
Definition
Device that is based on a configuration of multi network interfaces.
Term
What is an application filtering firewall?
Definition
intercepts connections and performs security inspections.
Term
What is a screened Host?
Definition
A type of firewall that implements both network-layer and application layer
Term
What are the major types of personal firewalls?
Definition
Personal Firewalls
Packet Filtering
Proxy servers
Circuit-level
Stateless inspection
Stateful inspection
Term
What does DMZ stand for?
Definition
demilitarized zone
Term
What is DMZ?
Definition
Created between two packet filter routers
Term
What should you do when you create a new rule for a firewall?
Definition
Test it
Term
What is it called when an IP address is combined with a port number?
Definition
A socket
Term
When using proxies, what does not exist between the server and client?
Definition
Direct Communications
Term
What is the Proxy Process?
Definition
1. Proxy allows the request
2. New packet is created and has the IP address of the proxy server
3. Web server receives the request
4. Web page is returned to the host (proxy server)
5. Proxy server checks the rule sets to verify that the web page is permitted
6. Decision is made to allow or deny
7. If allowed, the proxy creates a new information packet and delivers it to the original client
Term
How many editions are there for ISA server?
Definition
2
Term
What are the editions for the ISA server?
Definition
Enterprise and Standard
Term
What is the minimum requirement for installing ISA server 2004?
Definition
Windows 2003 Server
Term
What is used to configure the Microsoft Windows XP Firewall?
Definition
Network setup wizard
Term
What information can be found in the audit trail?
Definition
login, logouts, file manipulation and privileged actions, event name, date and time, success and failure rates, program, files accessed and user name.
Term
What is a hybrid Firewall?
Definition
combines both packet filtering with application-level firewall techniques
Term
Firewalls don't protect against what?
Definition
as access restrictions, back-doors threats, and vulnerability to inside hackers.
Term
What do firewalls filter?
Definition
Potentially harmful incoming or outgoing traffic or connections
Term
What is a way for a malicious insider to avoid or circumvent a firewall?
Definition
Back doors
Term
Tab characters in the syslog are for what?
Definition
ensure the actions in the syslog are separated.
Term
An IDS has the ability to do what?
Definition
to sniff individual packets of network traffic for attack signatures and alert the network administrator if intruders have slipped through the firewall.
Term
What type of traffic does the IDS report on?
Definition
that the firewall allows it to see
Supporting users have an ad free experience!