Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Footprinting
refers to the process of maliciously gaining information about domains. DNS zone
data can then be used in a malicious attack such as DOS attack.
Sender Policy Framework: Records provide email protection from spoofing and
phishing.
Delegated standard domain users and domain admins can administer a read only domain
controller RODC.
To ensure that a specific web site do not have access to your browsing patterns you
would use InPrivate filtering. InPrivate filtering settings allow you to identify
the web sites you will allow to receive data about the web sites you visited.
DNS Cache poising attack occurs when a malicious agent alters the name resolution
data of a DNS server.
Stateful firewall keeps track of the state of the connection and can log
information about connections.
Windows Updata Agent should be used for mobile clients. WUA contacts microsoft
windows update web site directly and checks for updates. You can control whether
the updates are downloaded and installed automaitcally for each client.
WPA Uses and Requires TKIP. TKIP users initialization vector and preshared key
values to generate encryption keys.
DMZ also referred to as a perimeter network or screened subnet. A DMZ can contain
servers that allow public access, firewalls are usually implemented between DMZ and
the public untrusted network.
Public Encryption keys in asymmetric encryption is used to encrypt data and can be
distrubuted by certificate. Two Keys are used in asymmetric encryption as public
and private keys.
Security Log: All security audits including policy changes are written to the
security log.