Practice Test 1 Flashcards
(276 cards)
Packets with internal source addresses entering the network
Packets with internal source addresses should never originate from outside the network; block them
Packets with external source addresses leaving the network
Packets with external source addresses should never be found on the internal network; block from leaving the network
Packets with private IP addresses exiting the network
Private IP addresses should never be used on the internet; block from leaving the network
Packets with public IP addresses entering the network
Packets with public IP addresses will routinely be allowed to enter the network
CDN
content distribution network: provides reliable, low-latency, geographically distributed content distribution
Four functions of a forensic disk controller
Write blocking: intercepts write commands sent to the device and prevents them from modifying data on the device. Returning data requested by a read operation. Returning access-significant information from the device. Reporting errors from the device back to the forensic host.
RAID 1
Disk mirroring; requires two physical disks that will contain copies of the same data
TGS
ticket-granting service; receives and validates a TGT from the client, then issues a ticket and session keys to the client
KDC
Key distribution center; does not communicate directly with the client as part of Kerberos
AS
Authentication server forwards the username to the KDC
TGT
ticket-granting ticket; provided by the client to the TGS for validation and in return, receives user’s rights to access the service requested
breach of contract by a vendor to protect sensitive data
civil investigation; contract dispute.
Administrative investigation
for internal purposes and not applicable when a third party is being investigated
Criminal and regulatory investigation
initiated by those with regulatory authority, typically government agencies
Wave pattern motion detectors
Transmit ultrasonic or microwave signals into the monitor area, watching for changes in the returned signals bouncing off objects
Infrared head-based detectors
Watch for unusual heat patterns
Capacitance detectors
Work based upon electromagnetic fields
Stateful packet inspection firewall
Dynamic packet filtering firewalls; track the state of a conversation and allow a response from a remote system based on an internal system being allowed to start the communication
Static packet filtering and circuit-level gateways
Only filter based on source, destination, and ports
Application-level gateway firewalls
Proxy traffic for specific applications
captive portal
provides access control for customers using wifi without provisioning user IDs while also gathering useful contact info
Business devices on open (unencrypted) wireless network
Wireless routers can provide multiple SSIDs. Separate SSID using WPA3 to create a private, secure network that is firewalled or logically separated
Hijacking customer web traffic including usernames and passwords
Open networks are unencrypted; traffic easily sniffable
Guideline
best practices, not mandatory; general, not specific