Term
|
Definition
| type of packet flood that allows attackers to amplify their bandwidth |
|
|
Term
| Smurf attack is also know as what? |
|
Definition
| Directed Broadcast attack |
|
|
Term
| What command remotly boots computers via the network? |
|
Definition
|
|
Term
|
Definition
| Access list that adds or restricts access to router |
|
|
Term
| What does "Access-list 101permit IP 0.0.0.0 255.255.255.255" mean? |
|
Definition
| Wild card that permit IP any any |
|
|
Term
| What can you use to copy configurations from your router remotly? |
|
Definition
|
|
Term
|
Definition
| System logs sent to a specific server via IP address |
|
|
Term
| What command do you use to check your router IOS version? |
|
Definition
|
|
Term
| What command do you use to get access to the privileged EXEC mode, which is sometimes called the "enable mode"? |
|
Definition
| Typing enable at the EXEC mode prompt. |
|
|
Term
| What is the command to enter the global configuration mode? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Authentication, Authorization, and Accounting |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| What is the best way to change ownership? |
|
Definition
|
|
Term
|
Definition
The default permissions given. 022 |
|
|
Term
|
Definition
| manually entered into the router and defines the path to the remote network |
|
|
Term
|
Definition
| uses information from other routers to create routes |
|
|
Term
| What is Cisco Discovery Protocol? |
|
Definition
| used by Cisco routers to exchange information, such as platform information and status, with each other |
|
|
Term
|
Definition
| allows a packet to dictate the path it takes through a routed network |
|
|
Term
|
Definition
| Secure Copy Protocol, Protocol used for loading and saving router configurations and provide integrity and confidentiality. |
|
|
Term
| What are the steps to Penetration Testing? |
|
Definition
Internal testing External testing |
|
|
Term
| What makes Identification of switches a little more dificult? |
|
Definition
| Switches do not always have IP address assigned to them. |
|
|
Term
| Properly configured routers will not have what? |
|
Definition
| TCP and UDP ports open to the internet, as well as no response to ICMP echo request packets |
|
|
Term
|
Definition
| (Network Mapper) is a security scanner used to discover Host and services on a computer network, thus creating a "map" of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host and then analyzes the responses. |
|
|
Term
|
Definition
| Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managing devices on IP networks." Devices typically supported include routers, switches, servers, workstations, printers, modem racks, and more." |
|
|
Term
| Can Ettercap be used to directly attack a devise? |
|
Definition
|
|
Term
| What is Role-based Access Control List (ACL)? |
|
Definition
| Permission for a particular SID to access the resource is determined and authorized through the ACL. |
|
|
Term
| What are you configuring with Security Configuration Wizard (SCW)? |
|
Definition
| Configuring authentication on Windows Server 2003 SP1 |
|
|
Term
| Server 2003 authentication is based on what? |
|
Definition
At least on of the following, Password PIN Smart card Token Biometrics |
|
|
Term
| What is the Audit Policy? |
|
Definition
| can be set so user or system activity in specific categories is recorded. |
|
|
Term
| What is the command to enter the global configuration mode? |
|
Definition
|
|
Term
| What are 2 types of named access lists? |
|
Definition
Extended (config -ext -n) Standars (config -std -n) |
|
|
Term
|
Definition
Authentication, Authorization, and Accounting |
|
|
Term
| What kind of notices might you see on a Login Banner? |
|
Definition
|
|
Term
| What command would you use to list how many virtual terminals your IOS has? |
|
Definition
|
|
Term
| How many different privilege levels does CISCO IOS provide? |
|
Definition
|
|
Term
| What level is User EXEC mode run? |
|
Definition
|
|
Term
| What level is privileged EXEC mode run? |
|
Definition
|
|
Term
| What command do you use to make your password a secret? |
|
Definition
|
|
Term
|
Definition
| The Console and Auxiliary ports on Cisco routers are used for serial connections to the router. |
|
|
Term
|
Definition
| A database used to translate, or resolve, fully qualified domain names (FQDN) into IP addresses and vise versa. |
|
|
Term
|
Definition
| service configured to start automatically in the Infrastructure template for all three security environments |
|
|
Term
| What is an option to be chosen through the SCW, depending on the level of information to be included within it? |
|
Definition
|
|
Term
|
Definition
| Multipurpose Internet Mail Extensions, consistency checks stricter rules, Windows explorer web server |
|
|
Term
| What provides standardized settings for the three classes of environments and what are they? |
|
Definition
Windows XP Security Guide templates
enterprise clients high security stand-alone environments |
|
|
Term
|
Definition
| set so user or system activity in specific categories is recorded |
|
|
Term
|
Definition
| show if administrator rights and permission are accessed or if an abuse of these rights is identified. |
|
|
Term
| What is group membership? |
|
Definition
| the means by which Windows implements security throughout the network |
|
|
Term
| What are the two types of groupes that Windows supports? |
|
Definition
Security Group Distribution Group |
|
|
Term
| What is the AD Group Policy? |
|
Definition
| The tool used to manage Security policies or settings that are implemented at the domain level |
|
|
Term
| What is Property of Transitivity? |
|
Definition
| refers to a logical trust relationship between three domains |
|
|
Term
| What is the Property Direction in Trust? |
|
Definition
| refers to the direction of trust flow between domains. |
|
|
Term
| What is a Domain Controller Baseline policy? |
|
Definition
| provides the basis for security configuration settings such as audit policy, security options, user rights assignments, and event log settings |
|
|
Term
| What is the security.inf file? |
|
Definition
| Specifies default security settings |
|
|
Term
| When was the Security Configuration Wizard (SCW) first used? |
|
Definition
| with Windows Server 2003 SP1 |
|
|
Term
| What was The Gold Disk software designed to provide? |
|
Definition
| the capability for the detection remediation and reporting of vulnerabilities on Windows-based systems and applications. |
|
|
Term
|
Definition
| manages system resources and communicates instructions to both hardware and software. modular |
|
|
Term
| What are the classes of routing protocols? |
|
Definition
| distance vector, link state, and hybrid |
|
|
Term
| Can ACLs be defined without applying them? |
|
Definition
|
|
Term
| The Audit Trail shows what? |
|
Definition
| admin rights and abuse of those rights |
|
|
Term
|
Definition
| Windows Server Update Servers |
|
|
Term
|
Definition
| Solves communication problems that occur between LINUX and Windows |
|
|
Term
| What is the command to remove a directory? |
|
Definition
|
|
Term
| What command is used to switch users? |
|
Definition
|
|
Term
| What command is used to list full path of working directory? |
|
Definition
|
|
Term
| What command is used to switch into the graphical user interface,? |
|
Definition
|
|
Term
| what interface is used to boot in command mode? |
|
Definition
|
|
Term
| What is a freely available tool that can be found on the internet? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| What are some other uses for samba? |
|
Definition
Support ACL's on printer and file shares Engage in NetBIOS browsing Become a master browser for Windows network |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Roll Based Access Control |
|
|
Term
| What Database stores all Active Directory objects? |
|
Definition
|
|
Term
| What port is prone to War Dialing? |
|
Definition
|
|
Term
| Distance Vector Protocol would be the same as what? |
|
Definition
| OSPF (open Shortest Path First |
|
|