Module 1: Introduction to Network Security Flashcards

(49 cards)

1
Q

What is a vulnerability?

A

Weakness in the network and/or its protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a threat?

A

A set of circumstances that has the potential to cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is intrusion?

A

Any act or event that compromises the information on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a breach?

A

Breakdown of security of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an interruption intrusion and what is an example?

A
  • Making access to a resource become unavailable

- Denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an interception intrusion and what is an example?

A
  • Gaining unauthorized access to information
  • Eaves dropping / sniffing
  • Traffic analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a modification intrusion and what is an example?

A
  • Tampering with a resource or information and changing it.

- Man in the middle (MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a fabrication intrusion and what is an example?

A
  • Insertion of counterfeit objects into a system

- Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an invasion intrusion and what is an example?

A
  • Taking control of a resource and steal information

- Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is active eavesdropping?

A

Send data probes & collect info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is passive eavesdropping?

A

Silent eavesdropping - no probes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Level 0 intrusion?

A

Normal system users - no intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Level 1 intrusion?

A

Intrusion occurs, but no evidence of damage and no trail is left.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Level 2 intrusion?

A

Intrusion occurs, but no evidence of damage but a trail is left.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Level 3 intrusion?

A

Files are damaged, programs and/or data are altered (e.g. Malware, MITM attack).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Level 4 intrusion?

A

Services disrupted (e.g. DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Level 5 intrusion?

A

Valuable information is stolen - cyber espionage cyber felony is committed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the four steps for a hacker to commit an attack?

A
  • Gather information
  • Look for vulnerabilities
  • Get access to the network
  • Launch the attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of information is useful for a hacker to gather information?

A
  • Domain names
  • IP addresses
  • Active ports
  • OS/CPU
  • Type of firewalls
  • Social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are NSLOOKUP and DIG? How are they used?

A
  • IP Address finder

- Gather information

21
Q

What is Netcraft? How is it used? How are they used?

A
  • Web server information gatherer

- Gather information

22
Q

What is traceroute, tracert and VisualRoute? How are they used?

A
  • IP address tracers

- Gather information

23
Q

What is iplocation.net? How is it used?

A
  • IP location finder (Geo location)

- Gather information

24
Q

What are nmap and zenmap? How are they used?

A
  • Port scanner ++ (veru detailed information about the host: hosts available, OS, packet filters and firewalls etc)
  • Gather information
25
What is angry IP scanner? How is it used?
- Port scanner (light weight) | - Gather information
26
What is Wireshark? How is it used?
- Traffic monitoring | - Gather information
27
What is TCPDump? How is it used?
- Traffic monitoring | - Gather information
28
What is Netstumbler? How it is used?
- Wireless network information gatherer // Active sniffer | - Gather information
29
What is whois? How is it used?
- Get domain information | - Gather information
30
What is Kismet? How is it used?
- Wireless network information gatherer // passive sniffer | - Gather information
31
How can Google be used by hackers?
Social engineering tool used by hackers.
32
What is Nessus? How is it used?
- Vulnerability scanning (compliance and malware) | - Vulnerability testing
33
What is Nexpose? How is it used?
- For full cycle vulnerability assessment: detection, verification, risk calculation, impact analysis reporting and mitigation. - Vulnerability testing
34
What is GFILANguard Network Security Scanner? How is it used?
- Scans network IP by IP and alerts vulnerabilities. | - Vulnerability testing
35
What is Nikto? How is it used?
- Web server scanner (scans with a database) | - Vulnerability testing
36
What is Nipper Studio? How is it used?
- Vulnerability assessment scanner for switches, routers and firewalls. - Vulnerability testing
37
What are the four tools used by hackers for gaining access?
- Brute force - Password Crackers - Keyloggers - Address spoofers
38
What is a Denial of Service attack?
Bring down a network so that legitimate users are prevented from accessing the network
39
What is a man-in-the-middle-attack?
- Secure position between a client and server - Impersonates either or - Data flows to attackers hose with no knowledge of the client or server
40
What is data modification?
- MITM attack extended to perform data modification
41
What is a replay attack?
Replay recorded packets at a later time fot the same server
42
What is an injection of malicious code attack?
Viruses, worms, trojan horses and logic bombs.
43
What is confidentiality? How is it achieved?
- No eavesdropping | - Cryptography
44
What is integrity? How is it achieved?
- Message received = message sent | - Cryptography
45
What is authentication? How is it achieved?
- Sender validation | - Cryptography
46
What is non-repudiation? How is it achieved?
- Source must not be able to deny a transaction | - Cryptography
47
What is certification? How is it achieved?
- Third party certifies the source as good | - Cryptography
48
What is access control? How is it achieved?
- Who can access what and when | - Firewalls
49
What is availability? How is it achieved?
- System resources are always available for legit users | - Firewalls