Securing Networks Flashcards

1
Q

Privilege Escalation

A

§ Occurs when a user is able to gain the rights of another user or administrator
§ Vertical Privilege Escalation
§ Horizontal Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Backdoor

A

A way of bypassing normal authentication in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

keys to having network security

A

An IPS, proper firewall configs, network segmentation, and firmware updates are the keys to having network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Electromagnetic Interference (EMI)

A

§ A disturbance that can affect electrical circuits, devices, and cables due to radiation or electromagnetic conduction
§ EMI can be caused by TVs, microwaves, cordless phones, motors, and other devices
§ Shielding the cables (STP) or the source can minimize EMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Radio Frequency Interference (RFI)

A

§ A disturbance that can affect electrical circuits, devices, and cables due to AM/FM transmissions or cell towers
§ RFI causes more problems for wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Crosstalk

A

§ Occurs when a signal transmitted on one copper wire creates an undesired effect on another wire
§ UTP is commonly used more often than STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Emanation

A

§ The electromagnetic field generated by a network cable or device when transmitting
§ A Faraday cage can be installed to prevent a room from emanating
§ Split the wires of a twisted-pair connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Protected Distribution System (PDS)

A

Secured system of cable management to ensure that the wired network
remains free from eavesdropping, tapping, data emanations, and other
threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Service Set Identifier (SSID)

A

§ Uniquely identifies the network and is the name of the WAP used by the
clients
§ Disable the SSID broadcast in the exam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rogue Access Point

A

An unauthorized WAP or Wireless Router that allows access to the secure
network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Evil Twin

A

A rogue, counterfeit, and unauthorized WAP with the same SSID as your
valid one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wireless Encryption Types

A

Pre-Shared Key (PSK)
Wired Equivalent Privacy (WEP)
WiFi Protected Access (WPA)
WiFi Protected Access version 2 (WPA2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pre-Shared Key

A

Same encryption key is used by the access point and the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wired Equivalent Privacy (WEP)

A

§ Original 802.11 wireless security standard that claims to be as secure as a wired network
§ WEP’s weakness is its 24-bit IV (Initialization Vector)

IV (Initialization Vector)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WiFi Protected Access (WPA)

A

Replacement for WEP which uses TKIP, Message Integrity Check (MIC),
and RC4 encryption

TKIP, RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WiFi Protected Access version 2 (WPA2)

A

§ 802.11i standard to provide better wireless security featuring AES with a
128-bit key, CCMP, and integrity checking
§ WPA2 is considered the best wireless encryption available

CCMP and AES

17
Q

2.4 GHz signal

A

Wireless B, G, and N use a 2.4 GHz signal

18
Q

5.0 GHz signal

A

Wireless A, N, and AC use a 5.0 GHz signal

19
Q

Jamming

A

§ Intentional radio frequency interference targeting your wireless network to cause a denial of service condition
§ Wireless site survey software and spectrum analyzers can help identify jamming and interference

20
Q

AP Isolation

A

Creates network segment for each client when it connects to prevent them from communicating with other clients on the network

21
Q

Wireless Attacks

A
War Driving
War Chalking
IV Attack
WiFi Disassociation Attack
Brute Force Attack
22
Q

IV Attack

A

Occurs when an attacker observes the operation of a cipher being used with several different keys and finds a mathematical relationship between those keys to determine the clear text data

This happened with WEP and makes it easy to crack

23
Q

WiFi Disassociation Attack

A

§ Attack that targets an individual client connected to a network, forces it offline by deauthenticating it, and then captures the handshake when it reconnects
§ Used as part of an attack on WPA/WPA2

24
Q

Brute Force Attack

A

Occurs when an attacker continually guesses a password until the correct
one is found

25
Q

WPA3 - Enterprise Mode

A

Uses AES-256 encryption with a SHA-384 hash for integrity checking

26
Q

WPA3 - Personal Mode

A

Uses CCMP-128 as the minimum encryption required for secure connectivity

27
Q

Simultaneous Authentication of Equals (SAE)

A

§ A secure password-based authentication and password-authenticated key agreement method
§ Simultaneous Authentication of Equals (SAE) provides forward secrecy

28
Q

Perfect Forward Secrecy or Forward Secrecy

A

A feature of key agreement protocols (like SAE) that provides assurance that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised

29
Q

Bluejacking

A

Sending of unsolicited messages to Bluetooth-enabled devices such as mobile phones and tablets

30
Q

Bluesnarfing

A

Unauthorized access of information from a wireless device through a Bluetooth connection

31
Q

Radio Frequency Identification (RFID)

A

§ Devices that use a radio frequency signal to transmit identifying information about the device or token holder
§ RFID can operate from 10 cm to 200 meters depending on the device

32
Q

Near Field Communication (NFC)

A

§ Allows two devices to transmit information when they are within close range through automated pairing and transmission
§ NFC devices are operated within 4 cm from each other