N10-007.6 Flashcards
(35 cards)
FTP Bounce
An FTP bounce attack uses the FTP PORT command to covertly open a connection with a remote system. Specifically, an attacker connects to an FTP server and uses the PORT command to cause the FTP server to open a communications channel with the intended victim, which might allow a connection from the FTP server, while a connection directly from the attacker might be denied.
Root Guard
A switch protection mechanism for STP. The switch ensures that superior BPDU messages are ignored.
Intrusion Detection System (IDS)
IDS devices can recognize the signature of a well-known attack and respond to stop the attack. However, an IDS sensor does not reside inline with the traffic flow.
Denial of Service (DoS)
A DoS attack floods a system with an excessive amount of traffic or requests, which consumes the system’s processing resources and prevents the system from responding to many legitimate requests.
Site-to-Site VPN
Interconnects two sites, as an alternative to a leased line, at a reduced cost.
Flood Guard
Serves as a preventive control against denial of service (DoS) or distributed denial of service (DDoS) attacks. A Flood Guard is available either as a standalone device or as a firewall component. It is capable of monitoring network traffic to identify DoS attacks in progress generated through packet flooding.
Hardware Firewall
A network appliance dedicated to the purpose of acting as a firewall. This appliance can have multiple interfaces for connecting to areas of a network requiring varying levels of security.
Intrusion Prevention System (IPS)
IPS devices can recognize the signature of a well-known attack and respond to stop the attack. An IPS device resides inline with the traffic flow, unlike an IDS sensor.
DHCP Snooping
The process of securing the network against a rogue DHCP server attack or other types of DHCP security attacks.
Challenge-Response Authentication Mechanism Message Digest 5 (CRAM-MD5)
A common variant of HMAC frequently used in email systems. Like CHAP, CRAM-MD5 only performs one-way authentication (the server authenticates the client).
Terminal Access Controller Access-Control System Plus (TACACS+)
A TCP-based protocol used to communicate with an AAA server. Unlike RADIUS, TACACS+ encrypts an entire authentication packet rather than just the password. TACACS+ offers authentication features, but they are not as robust as the accounting features found in RADIUS. Also, unlike RADIUS, TACACS+ is a Cisco-proprietary protocol.
Asymmetric Encryption
With asymmetric encryption, the sender and receiver of a packet use different keys.
Layer 2 Tunneling Protocol (L2TP)
A VPN protocol that lacks security features, such as encryption. However, L2TP can still be used for a secure VPN connection if it is combined with another protocol that provides encryption.
Lightweight Directory Access Protocol (LDAP)
An open standard for storing directory information for the network such as usernames and passwords and other user and computer parameters.
Symmetric Encryption
With symmetric encryption, both the sender and the receiver of a packet use the same key (a shared key) for encryption and decryption.
Nessus
A network-vulnerability scanner available from Tenable Network Security.
Insider Threat
In network security, this refers to an attacker who resides inside the network. Often, this might be an employee of the company.
Pretty Good Privacy (PGP)
PGP is a widely deployed asymmetric encryption algorithm and is often used to encrypt email traffic
Security Association (SA)
An agreement between the two IPSec peers about the cryptographic parameters to be used in an ISAKMP session.
Network-based IPS (NIPS)
An NIPS device is a network appliance dedicated to acting as an IPS sensor.
Internet Key Exchange (IKE)
A protocol used to set up an IPSec session.
Encapsulating Security Payload (EPS)
An IPSec protocol that provides authentication, integrity, and encryption services.
Unified Threat Management (UTM)
A firewall or gateway that attempts to bundle multiple security functions into a single physical or logical device.
Demilitarized Zone (DMZ)
Often contains servers that should be accessible from the Internet. This approach would, for example, allow users on the Internet to initiate an email or a web session coming into an organization’s email or web server. However, other protocols would be blocked.