50-5

  1. What is teardrop?
    a DoS attack, using mangled IP fragments with overlapping oversized payloads to the target machine
  2. What is TKIP?
    temporal key integrity protocol, an encryption key generation/management scheme used by 802.11i
  3. What is a URL?
    the address of a web page like http://en.wiktionary.org
  4. What is a VLAN?
    virtual local area network. Network within a network logically defined by grouping its devices switch ports in the same broadcast domain
  5. What is a VPN?
    Virtual private network. A logically constructed WAN using existing public transmission systems. Your VPN can keep data secure and isolated from other public traffic
  6. What is WPA?
    (“Wi-Fi protected access” security method. It uses RC4 encryption instead of AES. 80211i specifies AES
  7. In sales.mycompany.com, what is “sales”?
    the host name
  8. In sales.mycompany.com, what is “mycompany”?
    the sub domain name
  9. In sales.mycompany.com, what is “.com”?
    the top level domain name
  10. What is the network layer address?
    the IP address
  11. What is another name for the IP address?
    the network layer address
  12. ___ address = MAC address = datalink address = hardware address
    physical
  13. ___ address = physical address = datalink address = hardware address
    MAC
  14. ___ address = MAC address = physical address = hardware address
    datalink
  15. ___ address = MAC address = datalink address = physical address
    hardware
  16. ___address = network address = network layer address = logical address = virtual address
    IP
  17. IP address = ___ address = network layer address = logical address = virtual address
    network
  18. IP address = network address = ­­­­____ address = logical address = virtual address
    network layer
  19. IP address = network address = network layer address = ____ address = virtual address
    logical
  20. IP address = network address = network layer address = logical address = ____address
    virtual
  21. What is a host?
    every device on the internet is technically known as a host
  22. What is a bind server?
    a DNS server on the internet
  23. What is a “name server”?
    a DNS server
  24. What is anti-passback?
    The main purpose of an anti-passback system is to prevent a card holder from passing their card back to a second person to gain entry into the same controlled area
  25. What is a mirrored site?
    On the Internet, a mirror site is an exact copy of another Internet site. Mirror sites are most commonly used to provide multiple sources of the same information, and are of particular value as a way of providing reliable access to large downloads. Mirroring is a type of file synchronization
  26. What is a Faraday cage?
    The important concept to remember is that a Faraday cage acts as a shield against the effects of electromagnetic energy
  27. What is PPPoE?
    Point to Point Protocol over Ethernet is a proposal specifying how a host personal computer (PC) interacts with a broadband modem (i.e. xDSL, cable, wireless, etc) to achieve access to the growing number of High speed data networks. Relying on two widely accepted standards, Ethernet and the point-to-point protocol (PPP), the PPPoE implementation requires virtually no more knowledge on the part of the end user other than that required for standard Dial up Internet access
  28. What is a PTR record?
    DNS Records are the prime defining factor for a proper functioning of any Name Service. PTR Records refer to Pointer Record. This is mostly used to have a particular host be recognized on the internet by using an IP Address instead of the hostname. These are also called Reverse DNS Lookup address.
  29. For what is port 53 used?
    DNS server
  30. What are CRLs?
    certificate revocation lists
  31. What is VMOS?
    v-shaped metal-oxide semiconductor
  32. For what is port 443 used?
    https, http over SSL
  33. What is a supplicant?
    A Wireless Supplicant is a program that runs on a computer and is responsible for making login requests to a wireless network. It handles passing the login and encryption credentials to the authentication server. It also handles roaming from one wireless access point to another, in order to maintain connectivity
  34. What is PAP?
    PAP is used by Point to Point Protocol to validate users before allowing them access to server resources. Almost all network operating system remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore considered insecure. It is used as a last resort when the remote server does not support a stronger authentication protocol, like CHAP or EAP (while the last is actually a framework
  35. What is EAP?
    Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and Point-to-Point connections. The WPA and WPA2 standard has adopted five EAP types as its official authentication mechanisms.
  36. What is NAC?
    network access control. A network is often vulnerable to internal attacks from hosts on its own network rather that malicious entities attacking from outside the network. NAC lets your network devices allow or deny access to clients based on predefined access policies. NAC policies help prevent viruses and worms that have infected a client on your network from infecting other systems by denying the client access to the network based on its current status
  37. For what is port 25 used?
    SMTP
  38. What is OSW?
    The new Oracle OS watcher (OSWatcher) reports CPU, RAM and Network stress, and is a new alternative for monitoring Oracle servers
  39. What are reciprocal sites?
    A reciprocal link is a mutual link between two objects, commonly between two websites to ensure mutual traffic. Example: Alice and Bob have websites. If Bob's website links to Alice's website, and Alice's website links to Bob's website, the websites are reciprocally linked.
  40. What is an x.509 certificate?
    In cryptography, X.509 is an ITU-T standard for a public key infrastructure (PKI) for single sign-on (SSO) and Privilege Management Infrastructure (PMI). X.509 specifies, amongst other things, standard formats for public key certificates, certificate revocation lists, attribute certificates, and a certification path validation algorithm
  41. What is FIN/RST?
    a packet sent to get past your firewall when your network is under attack
  42. What is SYN/ACK?
    The second part of the three-way handshake is a SYN/ACK response. It is an acknowledgement of the SYN packet
  43. What is KEA?
    key phrase extraction algorithm. KEA is an algorithm for extracting key phrases from text documents
  44. What is SAFER?
    In cryptography, SAFER (Secure And Fast Encryption Routine) is the name of a family of block ciphers
  45. What is IRC?
    internet relay chat. A form of real-time Internet text messaging (chat) or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message as well as chat and data transfers via Direct Client-to-Client
  46. What is a shadow copy?
    Shadow Copy (Volume Snapshot Service or Volume Shadow copy Service or VSS ), is a technology included in Microsoft Windows that allows taking manual or automatic backup copies or snapshots of data, even if it has a lock, on a specific volume at a specific point in time over regular intervals
  47. What is TCPdump?
    tcpdump is a common packet analyzer that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Tcpdump works on most Unix-like operating systems
  48. What is IPX/SPX?
    Internetwork Packet Exchange/Sequenced Packet Exchange. IPX and SPX are networking protocols used primarily on networks using the Novell NetWare operating systems
  49. What are shadow passwords?
    Unix-like operating systems use the shadow password database mechanism to increase the security level of passwords by restricting all but highly privileged users' access to encrypted password data. Typically, that data is kept in files owned by and accessible only by, the super user (ie, on Unix-like systems, the root user, and on many others, the administrator account
  50. What is a SYN flood attack?
    A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system. A malicious client can skip sending this last ACK message. If these half-open connections bind resources on the server, it may be possible to take up all these resources by flooding the server with SYN messages. Once all resources set aside for half-open connections are reserved, no new connections (legitimate or not) can be made, resulting in denial of service. Some systems may malfunction badly or even crash if other operating system functions are starved of resources this way
Author
practice361
ID
15124
Card Set
50-5
Description
Terms
Updated