Card Set Information

2010-04-15 20:20:13

Show Answers:

  1. Can Java bite code be easily translated into the original code?
  2. What happens in DNS hijacking?
    gaining administrative access to DNS server
  3. How can you handle the “clear text” issue?
    Use SSL
  4. What is a NONCE?
    a randomly chosen value, different from previous choices, inserted into a message to protect against replays
  5. The ___ keeps your session continuing with the web server, until after it times-out?
    session ID
  6. SMTP uses port ___.
  7. Greylisting is ___.
    a method of protecting email users from SPAM by rejecting messages from unknown senders
  8. The difference between S/MIME versus PGP is ____.
    PGP does not protect attachments
  9. For windows implementation of SSH, you need ___.
    a third-party tool. But SSH is used natively in UNIX
  10. What are the two IPSec transport protocols?
    AH authentication header, and ESP encapsulating security payload
  11. What’s the difference between AH and ESP protocols in IPSec?
    AH adds its own header
  12. What is bluejacking?
    method of sending unwanted Bluetooth signals to devices
  13. What is bluesnarfing?
    gaining access to unauthorized information stored on devices
  14. What is WAP?
    wireless application protocol
  15. Is WAP a security implementation?
  16. What is WPA?
    Wi-Fi protected access. It specifies RC4 encryption rather than the AES specified in 802.11i
  17. What is WAP?
    wireless application protocol, designed to transmit things like web pages, email, etc. to wireless devices like cell phones with small screens
  18. MIME stands for ___.
    multipurpose internet mail extensions
  19. What happens with Active Directory, when you do something like “change a password”?
    the new password is assigned a USN; then the new password with its USN is propagated to the other domain controllers
  20. What is LDAP?
    lightweight directory access protocol used for accessing network directories
  21. What is USN?
    update sequence number, used in active directory
  22. Windows server keeps the USNs when you do a ___ restore.
    non-authoritative restore
  23. Windows server updates the USNs when you do a ___ restore.
    authoritative restore
  24. DHCP stands for?
    dynamic host configuration protocol
  25. Why is a “DHCP server for remote clients”, a vulnerability?
    it can provide attackers with IP addresses and other information if they can connect to it
  26. RAS stands for?
    remote access service
  27. What happens when you deny all permissions to the group “everyone”?
    that assignment overrides all other permissions you assign, because when different assignments combine, the result is the most restrictive
  28. Why is copper cable vulnerable?
    because it emanates
  29. Why is kiting a vulnerability?
    because false information can be submitted each time, and it’s a moving target
  30. What happens in DNS spoofing?
    manipulate the database to push people where you want them to go
  31. What is a potential problem with “hot fixes”?
    they may be untested
  32. How do you do basic logging on a UNIX system?
    use syslog
  33. Auditing on a windows system involves ___.
    group policy
  34. What is RPC?
    Remote procedure calls are a probing utility for gleaning information on services running on a system. Worms can spread via RPCs in NULL sessions
  35. If you’re not going to be using a particular service, you should ___.
    disable it
  36. Why should you disable the “alerter service”?
    to prevent a social engineering attack. It is used to forward alerts generated on the local computer, to users or remote computers
  37. What kind of system uses “ASET”?
    UNIX uses this automated security services tool in Sun Solaris
  38. What is the big vulnerability when you run one OS inside of another OS?
    shared memory
  39. What does “hardening” mean?
    update with the latest versions, patches and recommendations
  40. How do you back up Active Directory?
    make a “system state” backup
  41. What are USNs?
    update sequence numbers
  42. What is pretexting?
    in a pretexting attack, the attacker pretends to be someone he is not
  43. Spoofing is used in ___.
    identity concealment
  44. software out of the box should not be deployed until ___.
    after it is patched
  45. What is “Cain and Abel”?
    password cracking utility
  46. What is “John the Ripper”?
    password cracking utility
  47. How can you make telnet secure?
    use SSH secure shell
  48. SSH implements ___ to secure communications on both the server computer and the user computer.
    Public key cryptography
  49. What does “sniffing the wire” mean?
    doing a port scan
  50. What can you do to make a man in the middle attack more unlikely?
    Use IPSec