Network+ Extra 3 Flashcards
(10 cards)
An SNMP ___ message retrieves information from a managed device.
Get
An SNMP ___ message ____ a variable in a managed device or triggers an action on a managed device.
Set
The noAuthNoPriv (no authorization, no privacy) security level uses community strings for authorization and does not use encryption to provide privacy.
noAuthNoPriv
The authNoPriv (authorization, no privacy) security level provides authorization using hashed message authentication code (HMAC) with Message Digest 5 (MD5) or Secure Hash Algorithm (SHA). However, no encryption is used.
authNoPriv
The authPriv (authorization, privacy) security level offers HMAC MD5 or SHA authentication and provides privacy through encryption. Specifically, the encryption uses the Cipher Block Chaining (CBC) Data Encryption Standard (DES) (DES-56) algorithm.
authPriv
Many management systems provide a secured web connection using SSL/TLS security via a web browser.
HTTPS/management URL :
An example of using an overt channel is tunneling one protocol inside another (for example, sending instant-messaging traffic via HTTP). Steganography is another example of sending information over an overt channel. An example of steganography is sending a digital image made up of millions of pixels with “secret” information encoded in specific pixels, where only the sender and the receiver know which pixels represent the encoded information.
Sending info over overt channels :
different devices have trust with others if attackers can for example could compromise the host which is linked to the firewall then the attacker could bypass the firewall.
Trust Relationship Exploitation
An attacker could hijack a TCP session, for example, by completing the third step in the three-way TCP handshake process between an authorized client and a protected server. If an attacker successfully hijacked a session of an authorized device, he might be able to maliciously manipulate data on the protected server.
Hijacking a session
With this attack, a third-party system is used to help carry out the attack; oftentimes this third party is not compromised, making this attack very difficult to track down.
(DoS) Reflective: