All Appendix 4 Flashcards

(84 cards)

1
Q

HTTP / HTTPS OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FTP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SMTP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

POP3 OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DHCP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SNMP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Telnet OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSH OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NTP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TFTP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SIP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RDP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSL OSI Layer

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TLS OSI Layer

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NetBIOS OSI Layer

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RPC OSI Layer

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP OSI Layer

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

UDP OSI Layer

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IP OSI Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ICMP OSI Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IPSec OSI Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RIP OSI Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

OSPF OSI Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ARP OSI Layer
Network Layer
26
Ethernet OSI Layer
Data Link Layer
27
MAC OSI Layer
Data Link Layer
28
WiFI OSI Layer
Physical Layer
29
USB OSI Layer
Physical Layer
30
Bluetooth OSI Layer
Physical Layer
31
What does SMS stand for
Systems Management Server
32
What does SCCM stand for
System Centre Configuration Manager
33
What does SMS do
SMS is a system management software product by Microsoft for managing large groups of Windows-based computers
34
What does SMS provide
Remote control, patch management, OS deployment, hardware/software inventory
35
What does SUS stand for
Software Update Services
36
What does SUS do
SUS is a tool for centralising the update of Windows systems in a network, the SUS server downloads updates for specified versions of Windows then client can download updates from the internal SUS server, superseded by WSUS
37
What does WSUS stand for
Windows Server Update Services
38
What does WSUS do
WSUS builds on SUS, by allowing automatic download of hotfixes, updates, service packs, device drivers and feature packs to clients from a local central server
39
What does MBSA stand for
Microsoft Baseline Security Analyser
40
What does MBSA do
A software tool by Microsoft to assess missing security updates and less-secure security settings
41
How many IP's in a Class A network
16,777,214
42
How many IP's in a Class B network
16536
43
How many IP's in a Class C network
254
44
How to identify through subnet mask a Class A network
255.0.0.0
45
How to identify through subnet mask a Class B network
255.255.0.0
46
How to identify through subnet mask a Class C network
255.255.255.0
47
What is CAT5/Fibre
It is a twisted pair high signal integrity cable commonly used in networks, it is more secure and less susceptible to obtaining traffic from emitted signals
48
What is Wireless (802.11)
IEEE 802.11 is a set of standards carrying out wireless local area network communications
49
What is a VLAN
A VLAN is a group of hosts with a comon set of requirements that communicate as if they were attached to the same broadcast domain
50
What is the most common VLAN number
VLAN 1
51
What is VLAN Hopping
Allowing to break out of a VLAN
52
What does PGP use for message authentication
RSA or DSA
53
What is the X xxx for digital certificates
X. 509
54
What is the WEP key length
40 bit key
55
What is the bit length of an IV
24 bit
56
What does IV stand for (WEP)
Initialisation Vector
57
What is the purpose of an IV
To prevent and repetition, however a 24-bit IV is not long enough to ensure this on a busy network
58
What does GCOS stand for
General Comprehensive Operating System
59
What does the GCOS store and where
User information in the /etc/passwd file such as full name, phone number, etc.
60
What is a simple understanding of Cipher Blocks
A letter you want to send securely, it is broken up into equal chunks and those chunks are then encrypted and sent
61
What does CFB stand for
Cipher Feedback Mode
62
What does CBC stand for
Cipher Block Chaining
63
What does CFB do
Each plaintext block is XORed with the previous cipher text block before encryption
64
Where is the IV used
In the CBC cipher block
65
How is the IV used
In the CBC cipher block it is used for the first block to ensure any identical plaintext blocks don't produce the same output
66
What is CBC vulnerable to
If the IV is reused or predictable it can compromise encryption, susceptible to padding Oracle attacks
67
What does ECB stand for
Electronic Codebook Mode
68
Vulnerability in ECB
Uses the same key for all blocks, same text will be the same output
69
What is an FTP Bounce attack
An attacker uses and FTP server to open a communication to 3rd party systems bypassing security controls, can be used to port scan or obscure attack sources
70
What is a TEARDROP attack
Involves sending fragmented packets to a target machine, when the target tries to reassemble the packets it crashes due to overlapping fragments, DoSing the machine
71
What is a SMURF attack
Type of DDOS where an attacker sends ICMP ping requests to a network's broadcast address, spoofing the source IP as the victim's IP, the entire network resposne to the victim causign a DDOS
72
Why does a SMURF attack work
It works as the network broadcast address is designed to send the request to all devices in the network which will all reply to the victim
73
What is the length characteristics of a MAC Address
6 blocks separated by hypen/colon with 2 char in each block = 12 char
74
How to identify a multicast MAC address
01 in the first octet
75
Mnemonic for 512
5ubstitute 12 for exec
76
Mnemonic for 513
5secure floor 13 for login, who and users
77
Mnemonic for 514
5secure floor 14 for shell
78
What are the four important laws to remember
Computer Misuse Act 1990, Human Rights Act 1998, Data Protection Act 1998, Police and Justice Act 2006
79
What did the Computer Misuse Act 1990 do
It covers intended unauthorised access to computer material including data on a system, unauthorised modification of computer systems and impairing of operation of computers
80
What is required under the Computer Misuse Act 1990
Signed permission to access systems otherwise it is a breach of the Computer Misuse Act, all parties must be aware and give permission for testing
81
What did the Human Rights Act 1998 do
Employees have a right to privacy while in their place of work, which may be breached during pen tests, client contract should advice users that testers may gain access to private information, client should inform their employees about the testing.
82
What is the Data Protection Act 1998
Client and testers must protect customer data, testers must delete data when no longer required (i.e: after final report has been issued)
83
What is the Police and Justice Act 2006
Has amendments to the Computer Misuse Act, now includes; the intent of making a system insecure to allow unauthorised access, higher punishment for breaches and also making, suppling or obtaining articles for computer misuse such as viruses, worms, etc
84
What level of risk does penetration testing bring to a client
IT can slow the network response time, systems can be damaged, increased IDS and security audit logs.