1/33
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the different types of threats?
Information Theft
Data loss and Manipulation
Identity Theft
Disruption of Service
What are the different types of vulnerabilities?
Technological, Configuration and policy.
Describe hardware threats from the Physical threat class.
Damage to routers, servers...etc.
What does it describe when extreme temperature / humidity threatens devices?
Environmental threat.
Describe electrical threats from the Physical threat class.
Spikes in voltage, insufficient voltage, unconditioned power, and total power loss.
What is the final class in the Physical threat class?
Maintenance threats.
What are the types of malware?
Viruses, worms and trojan horses.
How do trojan horses spread?
They self replicate but spread through user interaction.
What distinguishes worms from other types of malware?
They do not need a human / program operating it.
What are the three Network attack categories?
Reconnaissance, Access, and Denial of Service.
What commands can easily determine the IP address space assigned to an entity?
nslookup and whois
What are the two ping sweep tools?
fping and gping.
What are the different types of access attacks?
Password attacks
Trust Exploitation
Port Redirection
Man in the Middle
What does a DoS attack do?
Interrupts communication.
What assets are available to aid the user in preventing threats?
VPN
ASA Firewall
IPS
ESA/WSA
AAA Server
How should a user back up their data?
Frequently, using proper storage, secure location, and validation.
True or false. AAA (Authentication, Authorization & Accounting) is similar to a credit card.
True.
What is a firewall topology with DMZ.
It allows outside users controlled access in the delimiterized zone (DMZ).
What are the types of firewalls?
1. Packet filtering
2. Application Filtering
3. URL Filtering
4. Stateful packet inspection
How do you configure ssh?
Step 1: config hostname
Step 2: config domain name
Step 3: generate a key to encrypt (crypto key generate rsa)
Step 4: verify/create local database entry using username.
Step 5: authenticate using login local
Step 6: transport input [ssh / telnet]
True or false. Small networks require an IT department.
False. Large networks require an IT department.
What should one plan for when making a small network.
Cost
Speed & Port/Interface types
Expandability
OS Features and Services
What does redundancy in a small network do?
Eliminates any single points of failure.
What is the highest priority in traffic management. Lowest? Whats second most important?
Voice, FTP, SMTP.
What are network applications?
End-user applications that are network aware.
What are application layer services?
Programs that interface with the network and prepare data for transfer.
Which protocols retrieve emails?
POP3 & IMAP.
True or false. Real-time applications must support QoS.
True.
What are the four scaling requirements?
Net documentation
Device inventory
Budget
Traffic analysis
What is net documentation?
The physical / logical topology.
How do you clear an arp table?
netsh interface ip or delete arpcache.
What are the CDP commands?
show cdp neighbor, show cdp neighbor detail, no cdp run, no cdp enable.
What information do the cdp commands provide?
device identifiers
address list
port identifier
capabilities list
platform
what does the terminal monitor command do?
It displays log messages on a remote location.