Chapter 1: Getting Started Flashcards
(122 cards)
What does OSI stand for?
Open Systems Interconnection
What does PDU stand for?
Protocol Data Unit
What are the 7 OSI Layers?
Top Down Order: All People Seem To Need Daily Planning
- Application
- Presentation
- Session
- Transport
- Network
- Data Link
- Physical
What is the 1st OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Physical
- USB Standards, Bluetooth
- Bit
What is the 2nd OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Data Link
- ARP, CDP, PPP
- Frame
What is the 3rd OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Network
- IP
- Packet
What is the 4th OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Transport
- TCP. UDP
- Segment
What is the 5th OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Session
- x.225, SCP, ZIP
- Data
What is the 6th OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Presentation
- AFP, NCP, MIME
- Data
What is the 7th OSI Layer?
Include Layer Name, Ex. Protocols, and PDU
- Application
- FTP, HTTP, SMTP
- Data
What are the 4 TCP/IP Layers?
- Application
- Transport
- Internet
- Network Access
Which OSI Layer(s) are equivalent to the TCP/IP Network Access Layer?
- Physical
- Data Link
Which OSI Layer(s) are equivalent to the TCP/IP Internet Layer?
Network
Which OSI Layer(s) are equivalent to the TCP/IP Transport Layer?
Transport
Which OSI Layer(s) are equivalent to the TCP/IP Application Layer?
- Session
- Presentation
- Application
How does the TCP handshake get initialized?
- SYN
- SYN-ACK
- ACK
What are the 5 security zones?
- Internet
- Internet DMZ
- Production Network Zone
- Intranet Zone
- Management Network Zone
Define vulnerability
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.
What are the vulnerability categories?
- misconfiguration
- default installations
- buffer overflows
- missing patches (unpatched servers)
- design flaws
- operating system flaws
- application flaws
- open services
- default passwords
Define hack value
The idea a hacker holds about the perceived worth or interest in attacking a target
Define zero-day attack
An attack carried out on a system or application before the vendor becomes aware and before a patch or fix action is available to correct the underlying vulnerability.
Define payload
The contents of a packet or specific malicious content an attacker delivers that is acted upon and executed by the system.
Define exploit
Software code, a portion of data, or a sequence of commands intended to take advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software or hardware.
Define daisy chaining
A method of external testing whereby several sysstems or resources are used together to make an attack.