-
What is teardrop?
a DoS attack, using mangled IP fragments with overlapping oversized payloads to the target machine
-
What is TKIP?
temporal key integrity protocol, an encryption key generation/management scheme used by 802.11i
-
What is a URL?
the address of a web page like http://en.wiktionary.org
-
What is a VLAN?
virtual local area network. Network within a network logically defined by grouping its devices switch ports in the same broadcast domain
-
What is a VPN?
Virtual private network. A logically constructed WAN using existing public transmission systems. Your VPN can keep data secure and isolated from other public traffic
-
What is WPA?
(“Wi-Fi protected access” security method. It uses RC4 encryption instead of AES. 80211i specifies AES
-
In sales.mycompany.com, what is “sales”?
the host name
-
In sales.mycompany.com, what is “mycompany”?
the sub domain name
-
In sales.mycompany.com, what is “.com”?
the top level domain name
-
What is the network layer address?
the IP address
-
What is another name for the IP address?
the network layer address
-
___ address = MAC address = datalink address = hardware address
physical
-
___ address = physical address = datalink address = hardware address
MAC
-
___ address = MAC address = physical address = hardware address
datalink
-
___ address = MAC address = datalink address = physical address
hardware
-
___address = network address = network layer address = logical address = virtual address
IP
-
IP address = ___ address = network layer address = logical address = virtual address
network
-
IP address = network address = ____ address = logical address = virtual address
network layer
-
IP address = network address = network layer address = ____ address = virtual address
logical
-
IP address = network address = network layer address = logical address = ____address
virtual
-
What is a host?
every device on the internet is technically known as a host
-
What is a bind server?
a DNS server on the internet
-
What is a “name server”?
a DNS server
-
What is anti-passback?
The main purpose of an anti-passback system is to prevent a card holder from passing their card back to a second person to gain entry into the same controlled area
-
What is a mirrored site?
On the Internet, a mirror site is an exact copy of another Internet site. Mirror sites are most commonly used to provide multiple sources of the same information, and are of particular value as a way of providing reliable access to large downloads. Mirroring is a type of file synchronization
-
What is a Faraday cage?
The important concept to remember is that a Faraday cage acts as a shield against the effects of electromagnetic energy
-
What is PPPoE?
Point to Point Protocol over Ethernet is a proposal specifying how a host personal computer (PC) interacts with a broadband modem (i.e. xDSL, cable, wireless, etc) to achieve access to the growing number of High speed data networks. Relying on two widely accepted standards, Ethernet and the point-to-point protocol (PPP), the PPPoE implementation requires virtually no more knowledge on the part of the end user other than that required for standard Dial up Internet access
-
What is a PTR record?
DNS Records are the prime defining factor for a proper functioning of any Name Service. PTR Records refer to Pointer Record. This is mostly used to have a particular host be recognized on the internet by using an IP Address instead of the hostname. These are also called Reverse DNS Lookup address.
-
For what is port 53 used?
DNS server
-
What are CRLs?
certificate revocation lists
-
What is VMOS?
v-shaped metal-oxide semiconductor
-
For what is port 443 used?
https, http over SSL
-
What is a supplicant?
A Wireless Supplicant is a program that runs on a computer and is responsible for making login requests to a wireless network. It handles passing the login and encryption credentials to the authentication server. It also handles roaming from one wireless access point to another, in order to maintain connectivity
-
What is PAP?
PAP is used by Point to Point Protocol to validate users before allowing them access to server resources. Almost all network operating system remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore considered insecure. It is used as a last resort when the remote server does not support a stronger authentication protocol, like CHAP or EAP (while the last is actually a framework
-
What is EAP?
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and Point-to-Point connections. The WPA and WPA2 standard has adopted five EAP types as its official authentication mechanisms.
-
What is NAC?
network access control. A network is often vulnerable to internal attacks from hosts on its own network rather that malicious entities attacking from outside the network. NAC lets your network devices allow or deny access to clients based on predefined access policies. NAC policies help prevent viruses and worms that have infected a client on your network from infecting other systems by denying the client access to the network based on its current status
-
For what is port 25 used?
SMTP
-
What is OSW?
The new Oracle OS watcher (OSWatcher) reports CPU, RAM and Network stress, and is a new alternative for monitoring Oracle servers
-
What are reciprocal sites?
A reciprocal link is a mutual link between two objects, commonly between two websites to ensure mutual traffic. Example: Alice and Bob have websites. If Bob's website links to Alice's website, and Alice's website links to Bob's website, the websites are reciprocally linked.
-
What is an x.509 certificate?
In cryptography, X.509 is an ITU-T standard for a public key infrastructure (PKI) for single sign-on (SSO) and Privilege Management Infrastructure (PMI). X.509 specifies, amongst other things, standard formats for public key certificates, certificate revocation lists, attribute certificates, and a certification path validation algorithm
-
What is FIN/RST?
a packet sent to get past your firewall when your network is under attack
-
What is SYN/ACK?
The second part of the three-way handshake is a SYN/ACK response. It is an acknowledgement of the SYN packet
-
What is KEA?
key phrase extraction algorithm. KEA is an algorithm for extracting key phrases from text documents
-
What is SAFER?
In cryptography, SAFER (Secure And Fast Encryption Routine) is the name of a family of block ciphers
-
What is IRC?
internet relay chat. A form of real-time Internet text messaging (chat) or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message as well as chat and data transfers via Direct Client-to-Client
-
What is a shadow copy?
Shadow Copy (Volume Snapshot Service or Volume Shadow copy Service or VSS ), is a technology included in Microsoft Windows that allows taking manual or automatic backup copies or snapshots of data, even if it has a lock, on a specific volume at a specific point in time over regular intervals
-
What is TCPdump?
tcpdump is a common packet analyzer that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Tcpdump works on most Unix-like operating systems
-
What is IPX/SPX?
Internetwork Packet Exchange/Sequenced Packet Exchange. IPX and SPX are networking protocols used primarily on networks using the Novell NetWare operating systems
-
What are shadow passwords?
Unix-like operating systems use the shadow password database mechanism to increase the security level of passwords by restricting all but highly privileged users' access to encrypted password data. Typically, that data is kept in files owned by and accessible only by, the super user (ie, on Unix-like systems, the root user, and on many others, the administrator account
-
What is a SYN flood attack?
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system. A malicious client can skip sending this last ACK message. If these half-open connections bind resources on the server, it may be possible to take up all these resources by flooding the server with SYN messages. Once all resources set aside for half-open connections are reserved, no new connections (legitimate or not) can be made, resulting in denial of service. Some systems may malfunction badly or even crash if other operating system functions are starved of resources this way
|
|