Save
Practice questions for this set
Learn 1 /7 Study with Learn
tells ping tool to send out 2 ICMP ECHO REQUESTS
-n 2 flag
type 8 then stop
Overview of the system, does not include how
hardware or software are configured but lays out
Conceptual Design
systems we need to achieve our goal and understand
criticality
A description of the functional requirements of a
Logical Design system. puts the compenents of a conceptual design
on paper using a network diagram.
The specification of the characteristics of the system
components necessary to put the logical design into
Physical Design action. like OS versions, patch levels, hardening
configurations... physical security can betray logical
security controls
, who accesses data, when it's accessed, how much is
communication flow
accessed
A computer networking device that connects systems
switch
to form a network
Router connects networks to networks
high level descriptions of a method an adversary
tactics
might use to formulate an attack
techniques a specific instance of the tactic being attempted
detailed explanation how the technique works to
procedure
implement that tactic of an attack
individuals, org, or group that is capable and
threat agents motivated to carry out an attack of one sort or
another
Threat Agents types opportunistic, organized cyber crime, and APT
a cyber attack in which an attacker sends a data
denial of service attack packet to the target computer, with the aim of
overloading its resources
Distributed Denial of An attack that uses many computers to perform a DoS
Service (DDoS) attack.
ACL Access Control List
CDN Content Distribution Network
Packet Sniffing the capture of the traffic of a network
routers are convinced to re-configure how and where
packet misrouting
they will route their traffic, to route improperly
router table poisoning modification of a router's routing table
DoS, DDoS, packet sniffing, packet misrouting, routing
attacks against routers
table poisoning
CDP information disclosure, MAC flooding, DHCP
attacks on switches
manipulation, STP manipulation, VLAN hopping