Domain 4 - Communications and Network Security Flashcards

1
Q

What is a smurf attack?

A

A DDoS attack. Directs large volumes of spoofed ICMP packets to a computer network using an IP broadcast address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a fraggle attack?

A

A DDoS attack directing large volumes of traffic to UDP/7 (echo) and UDP/19 (CHARGEN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a LAND attack?

A

A spoofed TCP SYN packet directed to open port on victim IP address with spoofed source IP and destination. Causing the machine to reply to itself on end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Code Red?

A

A worm that exploited a buffer overflow vuln targeting Microsoft IIS web servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a teardrop attack?

A

A DoS attack conducted by targeting TCP/IP fragmentation reassembly codes, causing fragmented packets to overlap one another on the host receiving them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How long is the typical mac address?

A

48 bits. Where the first 24 bits are the OUI and last 24 is the serial number called (EI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How longe are IPv6 MAC addresses?

A

They are now 64 bits. The first 24 is still the OUI and last 40 bits form the serial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between monitor mode and promiscuous mode?

A

Monitor mode allows for packet capture without first associating with the AP. Promicious mode requires an administrator to configure the NIC into promiscuous mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What port is SQL?

A

Port 1433 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What port is DNS?

A

UDP 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What port is DHCP?

A

UDP 67 and 68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What port is LPD?

A

TCP 515

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What port is Telnet?

A

TCP 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What port is FTP?

A

Port 20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What port is SNMP?

A

UDP 161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is frequency hopping spread spectrum (FHSS)?

A

Uses whole band in small intervals

17
Q

What is direct sequence spread spectrum (DSSS)

A

Spread radio energy over a single channel, i.e. uses the whole hand at once

18
Q

What is Orthogonal Frequency-Division Multiplexing (OFDM)?

A

Uses multiple simultaneous transmissions over a single channel

19
Q

What is the IEEE for Bluetooth?

A

802.15

20
Q

What encryption does IEEE 802.15 v2.1 use?

A

E0 symmetric cipher. It uses 128bit key but is only as strong as 38 bits. This is a weak cipher.

21
Q

What cipher does IEEE 802.15 v4.1 use?

A

AES with CBC-MAC (AES-CCM)

22
Q

What is bluesnarfing?

A

an attacker gains unauthorised access to the bluetooth device

23
Q

What is bluekjacking?

A

sending unsolicited messages to a victim via hijacked bluetooth connection

24
Q

What is bluebug?

A

malicious user makes calls, eavesdrop, sends SMS, download and modify phone data.

25
Q

What is wireless access protocol?

A

WAP is designed to provide secure web services to handheld wireless devices such as smart phones and PDAs.

26
Q

How many collision domains does a bridge have?

A
  1. One on each side.
27
Q

How many collision domains do repeaters and hubs have?

A

1

28
Q

What is port isolation?

A

Port isolation allows a network administrator to prevent traffic from being sent between specific ports

29
Q

What types of EAP should no longer be used?

A

EAP-MD5, LEAP, EAP-FAST

30
Q

What is a datagram?

A

This is a UDP data

31
Q

What is a segment?

A

A TCP Stream

32
Q
A