GSEC Questions and Correct Answers the Latest Update
0 view 0 purchase
Course
GSEC
Institution
GSEC
conceptual design
high level design that includes core components of network architecture | 'black box' I/O
| legal, environmental safety | customer experience | multidisciplinary
logical design
depicts how data flows across different devices in network | detailed, rather than abstract
net...
TestTrackers: Unlock Your Exam Potential! | Quality Practice Materials | Boost Your Confidence Today!
GSEC Questions and Correct Answers the
Latest Update
conceptual design
✓ high level design that includes core components of network architecture | 'black box' I/O
| legal, environmental safety | customer experience | multidisciplinary
logical design
✓ depicts how data flows across different devices in network | detailed, rather than abstract
network diagram | services, application names | for developers and security architects |
shows servers workstations routers firewalls...
physical design
✓ last before implementation | all known details | physical components and connections |
OS versions
communications flow
✓ dictated by logical design, shows how data flows in and out of the network | informs
threat model; attack surface and vectors; estimate impact; determines defense
intellectual property (IP)
✓ dictated by logical architecture | key is reduce number or locations where present; subject
to copyright
, TestTrackers: Unlock Your Exam Potential! | Quality Practice Materials | Boost Your Confidence Today!
✓ device that connects different networks together internal and external | forwards data
packets between computer networks | operates at OSI L3, handles packets
switch
✓ networking device that connects computers together to form physical and virtual networks
| handles frames at OSI L2
Kismet
✓ Linux WLAN sniffer completely passive used for vulnerability assessment and intrusion
detection
threat enumeration
✓ list threat agents | list attack methods | list system-level objectives
threat agents (3)
✓ human or not | organized crime | espionage | hactivist
Advanced Persistent Threat (APT)
✓ An organized group of attackers who are highly motivated, skilled, and patient. They are
often sponsored by a government, are focused on a specific target, and will continue
attacking for a very long time until they achieve their goal.
, TestTrackers: Unlock Your Exam Potential! | Quality Practice Materials | Boost Your Confidence Today!
✓ An availability attack, to consume resources to the point of exhaustion; Denial of Service;
flood of ICMP requests targets router takes down server
DDoS
✓ Denial of service attack committed using many computers, usually zombies on a botnet.
packet sniffing
✓ capture network traffic for analysis | no longer requires physical access to network due to
prevalence of wifi
packet misroute
✓ malware on router sends traffic to evil location or causes routing loops DoS or network
congestion
XSS
✓ Cross-site scripting. Attacker redirects users to malicious websites, steal cookies. E-mail
can include an embedded HTML image object or a JavaScript image tag as part of a
malicious cross-site scripting attack. Prevent with input validation.
CSRF
✓ Cross-Site Request Forgery--Third-party redirect of static content within the security
context of a trusted site.
, TestTrackers: Unlock Your Exam Potential! | Quality Practice Materials | Boost Your Confidence Today!
✓ A type of DoS where an attacker sends a large amount of SYN request packets to a
server in an attempt to deny service.
TCP reset
✓ attacker sniffs target traffic the spoofs packet with RST flag set to end session
routing table poisoning
✓ routers exchange data to build tables; attacker injects bad data
CDP
✓ Cisco Discovery Protocol; transmits in the clear; manipulation attack; disable this protocol
MAC flood
✓ An attack that sends numerous packets to the switch, each of which has a different source
MAC address, in an attempt to use up the memory on the switch and switch can
downgrade to hub
DHCP spoofing attack
✓ MitM attack listens for DHCP traffic then sends attacker IP address as default gateway
STP
✓ Spanning Tree Protocol. Protocol enabled on most switches that protects against switching
loops. A switching loop can be caused if two ports of a switch are connected together,
such as those caused when two ports of a switch are connected together.
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TestTrackers. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.