All Appendix 44 Flashcards

1
Q

HTTP / HTTPS OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FTP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SMTP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

POP3 OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DHCP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SNMP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Telnet OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSH OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NTP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TFTP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SIP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RDP OSI Layer

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSL OSI Layer

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TLS OSI Layer

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NetBIOS OSI Layer

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RPC OSI Layer

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP OSI Layer

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

UDP OSI Layer

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IP OSI Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ICMP OSI Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IPSec OSI Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RIP OSI Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

OSPF OSI Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ARP OSI Layer
Network Layer
26
Ethernet OSI Layer
Data Link Layer
27
MAC OSI Layer
Data Link Layer
28
WiFI OSI Layer
Physical Layer
29
USB OSI Layer
Physical Layer
30
Bluetooth OSI Layer
Physical Layer
31
What does SMS stand for
Systems Management Server
32
What does SCCM stand for
System Centre Configuration Manager
33
What does SMS do
SMS is a system management software product by Microsoft for managing large groups of Windows-based computers
34
What does SMS provide
Remote control, patch management, OS deployment, hardware/software inventory
35
What does SUS stand for
Software Update Services
36
What does SUS do
SUS is a tool for centralising the update of Windows systems in a network, the SUS server downloads updates for specified versions of Windows then client can download updates from the internal SUS server, superseded by WSUS
37
What does WSUS stand for
Windows Server Update Services
38
What does WSUS do
WSUS builds on SUS, by allowing automatic download of hotfixes, updates, service packs, device drivers and feature packs to clients from a local central server
39
What does MBSA stand for
Microsoft Baseline Security Analyser
40
What does MBSA do
A software tool by Microsoft to assess missing security updates and less-secure security settings
41
How many IP's in a Class A network
16,777,214
42
How many IP's in a Class B network
16534
43
How many IP's in a Class C network
254
44
How to identify through subnet mask a Class A network
255.0.0.0
45
How to identify through subnet mask a Class B network
255.255.0.0
46
How to identify through subnet mask a Class C network
255.255.255.0
47
What is CAT5/Fibre
It is a twisted pair high signal integrity cable commonly used in networks, it is more secure and less susceptible to obtaining traffic from emitted signals
48
What is Wireless (802.11)
IEEE 802.11 is a set of standards carrying out wireless local area network communications
49
What is a VLAN
A VLAN is a group of hosts with a comon set of requirements that communicate as if they were attached to the same broadcast domain
50
What is the most common VLAN number
VLAN 1
51
What is VLAN Hopping
Allowing to break out of a VLAN
52
What does PGP use for message authentication
RSA or DSA
53
What is the X xxx for digital certificates
X. 509
54
What is the WEP key length
40 bit key
55
What is the bit length of an IV
24 bit
56
What does IV stand for (WEP)
Initialisation Vector
57
What is the purpose of an IV
To prevent and repetition, however a 24-bit IV is not long enough to ensure this on a busy network
58
What does GCOS stand for
General Comprehensive Operating System
59
What does the GCOS store and where
User information in the /etc/passwd file such as full name, phone number, etc.
60
What is a simple understanding of Cipher Blocks
A letter you want to send securely, it is broken up into equal chunks and those chunks are then encrypted and sent
61
What does CFB stand for
Cipher Feedback Mode
62
What does CBC stand for
Cipher Block Chaining
63
What does CFB do
Each plaintext block is XORed with the previous cipher text block before encryption
64
Where is the IV used
In the CBC cipher block
65
How is the IV used
In the CBC cipher block it is used for the first block to ensure any identical plaintext blocks don't produce the same output
66
What is CBC vulnerable to
If the IV is reused or predictable it can compromise encryption, susceptible to padding Oracle attacks
67
What does ECB stand for
Electronic Codebook Mode
68
Vulnerability in ECB
Uses the same key for all blocks, same text will be the same output
69
What is an FTP Bounce attack
An attacker uses and FTP server to open a communication to 3rd party systems bypassing security controls, can be used to port scan or obscure attack sources
70
What is a TEARDROP attack
Involves sending fragmented packets to a target machine, when the target tries to reassemble the packets it crashes due to overlapping fragments, DoSing the machine
71
What is a SMURF attack
Type of DDOS where an attacker sends ICMP ping requests to a network's broadcast address, spoofing the source IP as the victim's IP, the entire network resposne to the victim causign a DDOS
72
Why does a SMURF attack work
It works as the network broadcast address is designed to send the request to all devices in the network which will all reply to the victim
73
What is the length characteristics of a MAC Address
6 blocks separated by hypen/colon with 2 char in each block = 12 char
74
How to identify a multicast MAC address
01 in the first octet