Test Review Flashcards
(40 cards)
Stateful Inspection
Compares certain key parts of the packet to a database of trusted information
Packet Filtering or Packet Purity
Analyzed against a set of filters. That make it through the filters are sent to the requesting system and others are discarded
IP Addresses
Blocks certain Ip addresses or a range of IP addresses
Protocols
Decides which if the systems can allow or have access
Ports
Blocking or disabling ports of severs that are connected. Maintain the kind of data flow you want to see and close down possible entry points for hackers.
Keywords
Will block any website that has to deal with certain predetermined keywords
IP
Internet Protocol. The main delivery system for information over the Internet
TCP
A protocol developed for the internet to get data from one network device to another
HTTP
Hyper Text Transfer Protocol
FTP
Files Transfer Protocol. Used to upload or download files
UDP
User Datagram Protocol. Used for information that requires no response. For example streaming audio or video
ICMP
Internet Control Message Protocol. Used by a router to exchange information with other routers
SMTP
Simple Mail Transport Protocol. Used to send text based information, email
SNMP
Simple Network Management Protocol. Used to collect system information from a remote computer
Telnet
Used to preform commands on a remote computer
Remote Login
When someone connects to a computer via the Internet
Application Backdoor
Hidden access that provides some level of control of the program
SMTP Session Hijacking
By gaining access to a list of email addresses a person can send spam to thousands of users
Operating Systems Bugs
Operating systems backdoors
E-mail bombs
Large quantity of bulk e-mail that overwhelms and e-mail server preventing user access
Macros
Tools that allow a user to program repetitive tasks into the computers memory so that they can be quickly accomplished with the touch of a couple keys that the user has selected
Spam
Unwanted e-mail(usually of a commercial nature sent out in bulk)
Redirect Bombs
Hackers can use ICMP to change the path information take by sending it a different router
Source Routing
Technique in which the originator of a packet can attempt to partially or completely control the path through the network to the destination.