Security+ Set 5
Terms
undefined, object
copy deck
- What does echo do?
- responds to packets on UDP port 7
- What does chargen do?
- responds to packets on UDP port 19 with random characters
- What is an FTP bounce?
- running scans against other computers through a vulnerable FTP server
- What version of BIND allows for mutual authentication?
- BINDv9
- What ports are commonly used for NetBIOS names and sessions?
- TCP/UDP 137, 138, 139
- What ports do DHCP and BOOTP use?
- TCP/UDP ports 67 and 68
- What port does NNTP use?
- TCP/UDP 119
- What port does LDAP use?
- TCP/UDP port 389
- What port does LDAPS use?
- TCP/UDP port 636
- Why can hand geometry only be used for verification, rather than identification?
- hand geometry is not unique
- What advantages do hand geometry scans have over fingerprint scans?
- they are faster, cleaner, and less invasive
- What are the advantages and disadvantages of retinal scanning?
- most reliable but most invasive
- What disadvantage does speech recognition have?
- easier to spoof than other biometric techniques
- What are QIC tapes primarily used for?
- backing up standalone computers
- What are DAT drives primarily used for?
- basic network backups
- What three tape types offer high capacity and rapid data transfer?
- 8mm, DLT, and LTO
- How does a host respond to a TCP connect scann if the scanned port is open? Closed?
- open: SYN-ACK; closed: RST
- What can be done to reduce the effects of half-open attacks?
- reduce the time a port waits for a response
- How does a host respond to a FIN packet if the scanned port is open? Closed?
- open: packet discarded; closed: RST
- How does an XMAS scan work?
- a variety of TCP packets are sent to elicit a response
- What TCP sequence number does an XMAS scan use?
- 0
- What are two characteristics of a null scan?
- TCP sequence number set to 0; no TCP flags set
- What is a TCP ACK scan used for?
- determining if a port is filtered by a firewall
- What is a window scan?
- a scan that attempts to determine the OS in use by its default TCP window size
- What are the two basic types of DoS attacks?
- flaw exploitation attacks and flooding attacks
- What three basic router/firewall measures will reduce the effects of a DoS attack?
- egress filtering, ingress filtering, and disabling IP-directed broadcasting
- What is source routing?
- Sender defines hops a packet must travel through
- How is source routing used by attackers?
- used to route packets around security devices
- How can source routing be defended against?
- routers can be configured to discard source-routed packets
- What two methods do IDS's use to detect and analyze attacks?
- misuse detection and anomoly detection
- What advantage does LEAP have over EAP?
- LEAP allows for mutual authentication
- What protocol does 802.1x use for authentication?
- EAP
- How does an 802.1x authenticator handle authentication traffic?
- Passes it to a RADIUS server for authentication
- What is ECC?
- Elliptical Curve Cryptography- public-key cryptographic method which generates smaller, faster, and more secure keys
- What standard is LDAP based on?
- X500
- Who developed SSL?
- Netscape
- What three protocols are routinely layered over TLS?
- IMAP, POP3, and SMTP
- What two types of certificates does S/MIME use?
- PKCS #7 certificates for message content and X.509v3 for source authentication
- What is the "hidden node" problem?
- When a wireless client cannot see the network due to interference.
- What does WEP stand for?
- Wired Equivalent Protection
- In a 128-bit WEP key, how long is the actual secret key?
- 104 bits- the first 24 bits are used for the Initialization Vector (IV)