Chapter 2 - Telecommunications and Network Security Flashcards Preview

My Notes of CISSP CBK > Chapter 2 - Telecommunications and Network Security > Flashcards

Flashcards in Chapter 2 - Telecommunications and Network Security Deck (157)
Loading flashcards...
121

Syn Attack

high number of half open connections

122

Macro Virus

Not depending on size of packet

123

Distributed Denial of Service

First Phase - compromise as many machines as possible. Components - client, handler, agent, target

124

VPN Software

Does not encrypt

125

Bots and Botnets

Bots are zombies controlled by shadowy figures - largest shource of spam e-mail

126

Teardrop

ip fragments are constructed so that the target host calculates a negative fragment length

127

Overlapping fragment attack

subvert packet filters that only inspect the first fragment of a fragmented packet.

128

Source Routing Exploitation

sender specifies path

129

Smurg and Fraggle attacks

use broadcasts to create DoS attacks. Smurf misuses ICMP. Fraggel uses UDP

130

NFS Attacks

basic authentication method easy to exploit

131

Network Nws Transport Protocol Secuirty

NNTP - main shortcoming authentication

132

Finger Use Information Protocol

last log in time of a user and whether currently logged in

133

Network Time Protocol

NTP sychronizes computer clocks

134

DoS

overload with excessive traffic

135

Syn Flood Attack

DoS against the inital handshake - overloads the target's connection table

136

Spoofing

bogus source address

137

Session Highjack

unatuhorized insertion of packets into a data stream

138

Layer Ethernet 802.3 is placed on

Data Link Layer

139

Best Proactive Network Defense

Perimeter Surveillance and intelligence gathering

140

Network is not the target of attack in

man in the middle attack

141

Most effective against a distribute DoS attack

Traffic Filtering

142

Optimal placement for network based intrusion detection systems

On the network perimeter to alert the network administrator of all suspicious activity

143

End-point devices most likely be considered part of a converged IP network

fileserver, ip phone, security camera

144

an advantage of fiber-optic over copper cables from a security perspective

more difficult to wiretap

145

Part of a network's perimeter defense

firewall, proxy server, host based intrusion detection system

146

Principal Security Risk of wireless LANs

Lack of physical access controls

147

WLAN's SSID configured with adequate security protection

SSIDs are not for authentication

148

IPSec

provides mechanisms for authentication and encryption

149

Security Event Manager

aggreagates logs from security devices and application servers looking for suspiious activity

150

DNS weakness

lack of authenticationof servers and therby the authenticity of records