Tuesday, 23 July 2019

host intrusion detection system (HIDS) used for?

An HIDS is used to monitor potential or suspected intrusions on a system or host

unlike an NIDS it cannot be used to monitor traffic or activity on a network.

it looks for changes to files,
 misuse,
privilege abuse,
alterations to log files,
and other activities depending on the vendor.

LOIC is used for?

The Low Orbit Ion Cannon(LOIC)

is used to perform DoS or DDoS attacks against a victim system.

false negative

no report of an attack even though one is actually taking place.

what is the problem with SMTP about security?

the protocol is unencrypted

provides no protection against sniffing or hijacking

the protocol can be protected

if used with a VPN or similar technology.

false positive?

a report of an attack where one does not exist.

802.11 standards covers security relating to WPA2?

802.11i is the standard concerned

with the design and implementation of WPA2.

open and closed ports on a system?

Port scanners

Nmap and SuperScan

can determine the status of ports on a system or groups of systems.

ESP mode?

Encapsulating Security Payload(ESP)

mode

protects the contents of a packet in IPsec.

Bluetooth goes by which IEEE standard number?

802.15

white-box test?

extensive or full information is given to an evaluating party

to test the internal workings of an environment for audit purposes.

overt channel?

is a system that is used in a manner consistent with its design.

receipt of an RST flag indicate?

that  a port is closed

which port is used by SSL?

Port 443   by convention

to be used by the SSL and TLS protocols

when combined with HTTP.

Layer 3

router layer 3

routable protocols

IP portion of the TCP/IP