Week 3 Flashcards

(59 cards)

1
Q

What are the 3 CND capabilities?

A
  • protect
  • monitor, detect, analyze
  • respond
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the purpose of NCDOC.

A

Navy’s CND provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where does the U.S. Fleet send all of its network traffic?

A

1 of 4 NOCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where are the 4 regional NOCS located?

A
  • ECRNOC
  • PRNOC
  • UARNOC
  • IORNOC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the ACS provide?

A

Single management point for user credentials controlling verification, validation, and auditing for asset access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is AAA?

A

Authentication
Authorization
Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is authentication?

A

Confirming the ID of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is authorization?

A

Determines what functions a user can have access to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 2 security protocols associated to ACS and which one is CISCO propriety?

A

RADIUS
TACAS +

TACAS + is CICSCO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What command will show you the last several commands in EXEC mode?

A

Show history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User exec mode sign
Privileged exec sign
Global config sign

A

> #
(Config)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where is the routers startup config file stored?

A

NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is he purpose of the spanning tree protocol?

A

Loop free topology and redundant paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What feature implements software to protect TCP servers from TCP SYN-flooding attacks?

A

TCP intercept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What command will allow you to perform router system backup?

A

Copy startup-config tftp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can you view from the show environment command?

A

Hardware alarms, temps, power supply status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of firewall inspects traffic aT the application layer?

A

Firewall proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of filter inspects traffic at the network and transport layers?

A

Packet filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A ________ refers to the area of a network that contains the endpoint.

A

Burb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How is the Mcafee Firewall Enterprise managed?

A

Firewall Enterprise Control Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What components does he Mcafee Firewall Cinteil Center consist of?

A
  • control center client suite

- control center management server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are he 2 common designs of VPNs?

A

Site to site

Host to site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which VPN protocol can operate in transport and tunnel mode?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the 2 products that make up he CND-S IVS?

A
  • fortimanager

- fortigate

25
What is the purpose of having two in-line virus scanners?
- redundancy | - load balancing
26
What port is DNS?
53
27
What are the 2 DNS configuration commands and what do they do?
Chuser : changes root directory | Chroot: changes user roots
28
What is AIDE used for?
- file integrity checker | - ensures DNS database are not corrupted
29
What is a rogue access point?
Unauthorized and unknown access points that have been connected to the network
30
Describe the two types of wireless LAN attacks
Passive: does not modify Active: makes changes
31
Eavesdropping/sniffing
Listening, monitors
32
Traffic analysis
Gaining intel WITH INTENTION
33
DOS
Floods one or more wireless devices
34
Impersonation Attack
MAC Spoofing
35
Evil Twin
Duplicating SSIDs and MAC addresses
36
Man in the Middle Attack
Inserts themselves
37
Authentication Attack
Passwords, authentication process
38
Encryption cracking
Encrypted cracking software, encrypted packets
39
Injection Attack
Generating beacon responses
40
Peer-to-peer Attack
Ad-hoc mode
41
Define WPA.
Standard created to address weakness of the WEP encryption by using dynamic encryption key generation
42
What 3 categories does data fall into and explain.
- Data at rest: saved files - Data in use: files being edited - Data in motion: email, data being transmitted
43
What 3 sections is metadata broken into and describe.
- Descriptive: titles, authors, key words - Structural: pages, chapters - Admin: permissions, file types
44
What are some examples of hidden data?
- document properties and personal info - headers/footers - invisible content - off slide content - presentation notes - hidden text
45
5 pillars of IA and explain.
- confidentiality: restricted access - integrity: can flex be edited or altered without encryption key - availability: data can be accessed - authentication: data coming from trusted source - non-repudiation: you send it, no take backs
46
What are the three main types of encryption?
- hash - symmetric - asymmetric
47
What are the key terms associated to encryption and decryption?
- cleartext - plaintext - algorithm - keys - ciohertext
48
What is cleartext
No encryption
49
What is plaintext
Cleartext that is to be encrypted
50
What is algorithm
Procedures or formulas
51
What is key?
Mathematical values
52
What is ciphertext?
Encrypted text
53
What are the common hash types?
- MD5 | - SHA
54
What encryption algorithm allows he ability to both encrypt and decrypt data streams?
Symmetric
55
Which keys are generated by the master secret key?
- client write MAC secret - server write MAC secret - client write key - server write key
56
What is a CA, RA, CRL?
CA: trusted third party RA: handles and processes certificate requests CRL: list of revokes certs
57
What algorithm performs authentication in the Cipher Suite?
Key exchange algorithm
58
Two asymmetric keys
- public | - private
59
3 utilities of SSH
Slogin command SSH SCP