CIA
What is Confidentiality, Integrity and Availability?
Something you know, something you have,something you are
What are authentication factors?
New vulnerability, unknown to vendor
What is zero day vunlnerability?
Provides a bridge btwn a cabled network and wireless clients or stations
What is a Wireless Access Point (WAP)?
The system can experience failures and still provide the same or nearly the same level of service
NIST
What is National Institute for Standards and Technology?
Brute force and dictionary attacks
What are password attacks?
Open ports and services, Unsecure protocols, Weak Encryption, Errors - messages which reveal too much info about system
What are Weak Network Configurations Vulnerabilities?
Apply Access Control List (ACL) to filter traffic passing in or out of a network segment
What is a firewall?
Percentage of time the system is online, measured over a defined period typically one year
What is high availability?
ACL
What is Access Control List?
Ticket Granting Ticket and a Ticket Granting Session session key
What is Kerberos authentication?
nslookup
What are Local host and hostname resolution tools?
DHCP - Dynamic Host Configuration Protocol, Service to assign to client upon connection
Internet Service Provider (ISP), assigned when get the service
Where do IP Addresses come from ?
Provides redundancy for storage devices; many disks can act as backups for each other to increase reliability and fault tolerance
What is RAID (Redudant Array of Independent Disks)?
MTTR
What is Mean Time To Recover?
Somewhere you are, something you can do, something you exhibit, someone you know
What are authentication attributes?
route, traceroute, pathping
What are Tools for understanding routing?
PDU: Packet,.HW: Router, Layer 3 Switches, Addressing: IP Addresses (Logical Addresses), Protocols: IP, ICMP, IPSec, IGMP, Control: Packet Filtering Firewall
What is the Network Layer?
Protecting systems against power events which could harm systems; Dual Power Supplies
What is Power redundancy?
PCI DSS
What is Payment Card Industry Data Security Standards?
Defines how to manage credit/debit card data
Authentication Protocols for use with remote access protocols (serial link or VPN)
What are PAP and CHAP?
PAP - Password Authentication Protocol
CHAP - Challenge Handshake Authentication Protocol
ipconfig, ifconfig, ip; ping; arp
What are Tools for footprinting the network and detecting rogue systems?
Forward packets around an internet based on IP addresses; can apply logical IP subnet addresses to segments within a network
What is a router?
Means a server is installed with multiple NICs or NICs with multiple ports allowing each port to a separate network cable
What is NIC teaming?