Lesson 10 - Chapter 2: Network Threats Flashcards

1
Q

What are attack vectors?

A

different ways to infiltrate systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The CompTIA A+ exam calls attack vectors what?

A

threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Zero-Day Attack?

A

an attack on a vulnerability that wasn’t known to the software developers

(exposes an unknown vulnerability, developer has 0 days to fix it!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Spoofing?

A

Pretending to be someone/something you’re not by placing false information into your packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are 4 examples of the types of data that can be spoofed?

A
  1. Source MAC address and IP address (to make you think it came from somewhere else)
  2. Email address
  3. Web address (you’re not actually on that page)
  4. User name (not really that user)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an on-path attack? What is it also called? (2)

A

Also called a man-in-the-middle (MITM) attack

an attacker intercepts traffic between 2 systems, reading and changing the data then sending it forward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What kind of attack is it when a person using special software on a wireless network makes all the clients this his laptop is a wireless access point?

A

on path attack (MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Can an attacker gain access to passwords, shared keys, and other sensitive information in an on-path attack? When?

A

yes (when using special software on a wireless network to make clients think his laptop is a wireless access point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is session hijacking?

A

similar to MITM, tries to intercept a valid computer session to get authentication information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s the difference between session hijacking and a MITM attack?

A

session hijacking only tries to get authentication information it doesn’t listen in like MITM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Evil Twin attacks?

A

an attacker inserts a rogue access point into a wireless network so users connect to the device instead of the real AP to intercept their traffic/info

(Wi-Fi intrusion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What ways can an Evil Twin attack be set up?

A

smartphone or other Wi-Fi-capable device, but typically a wireless network AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do you prevent/detect evil twins?

A

contract for a professional site survey to be performed periodically at random

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is brute force?

A

a method where a threat agent guesses all possible values for some data

(doesn’t just apply to passwords)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you protect against brute force attacks on a password?

A

set up a password policy that locks a system after a c ertain number of invalid password guesses

(doesn’t do much for other types of brute force attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some things that can be brute-forced? (3)

  1. search
  2. net
  3. us
A
  1. search for open ports
  2. network IDs
  3. user names

etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a DoS attack?

A

a single device attempts to bog down/crash another device by overwhelming its Internet connection with connection requests

(rapidly repeating pings, page requests, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does DDoS stand for?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a DDoS attack?

A

uses multiple coordinated devices to perform the DoS attack (several devices attempt to bog down a device with connection requests)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What types of devices are usually involved in a DDoS attack?

A

zombie members of a botnet (compromised by malware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a SQL injection?

A

when an attacker inserts malicious SQL statements into the coding of a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What’s the purpose of a SQL injection?

A

To access data stored on the back-end database of the website the user can’t see

(customer records, company financial data)

23
Q

What does an XSS attack stand for?

A

cross-site scripting

24
Q

What is an XSS attack?

A

cross-site scripting, the attacker inserts malicious coding statements (usually JavaScript) into a web page that executes when the page is displayed in a browser

(client-side attack bc client’s browser executes it)

25
Q

What are 2 ways an XSS attack is commonly performed?

A
  1. script is added as a string to the end of the URL
  2. injected into the page’s HTML or JavaScript coding
26
Q

What’s the largest threat any workplace network has?

A

its internal users

27
Q

What is an “insider”?

A

any authorized (authenticated) user who is aware of an organization’s data resources, employees, security systems, etc

28
Q

The first step in securing data is through what? How does that look like?

A

Through authentication, using a username and password

29
Q

Do firewalls stop hackers from intercepting network packets?

A

No, firewalls are more for controlling traffic from the Internet coming into a network and traffic going out of the network to the Internet

(which is why we turn to encryption)

30
Q

Is network encryption limited to Internet-based activity?

A

No, there are many levels of network encryption each of which provides multiple options

31
Q

What are 3 examples of authentication protocols used to authenticate wireless networks?

A
  1. RADIUS
  2. TACACS+
  3. Kerberos
32
Q

What does RADIUS stand for?

A

Remote Authentication Dial-In User Service protocol

33
Q

What is RADIUS used for?

A

Users log into a RADIUS network to be given access by a RADIUS server to credentials that have been verified for that requester. Provides centralized user authentication.

34
Q

What types of networks use RADIUS?

A

Large wireless networks (like those with a domain server)

(enterprise networks)

35
Q

What does TACACS+ stand for?

A

Terminal Access Controller Access-Control System Plus

36
Q

What is TACACS+?

A

A centralized authentication protocol used on larger wireless networks, primarily for device administration

(enterprise networks)

37
Q

What is Kerberos?

A

its primary purpose is to authenticate a user without the need to transmit a password over the Internet

(supports SSO single sign-on)

38
Q

Where is Kerberos most used?

A

its the primary authentication protocol for many websites

39
Q

What are the 4 parts of the Kerberos authentication process?

A
  1. Client requesting content
  2. Server hosting the requested content
  3. Authentication server issues ticket-granting ticket (TGT)
  4. KDC (key distribution center) - the server the AS operates on
40
Q

The encryption method used on data in transit (through a network) is dictated by what?

A

the method the communicating systems will connect with

(a private connection like WAN, for example)

41
Q

What is IPsec?

A

Microsoft’s encryption method for networks linked by a private connection (like WAN) and provides transparent encryption between the server and the client (data in transit)

42
Q

What is the most famous type of application encryption?

A

SSL (Secure Sockets Layer) security protocol to secure websites

43
Q

What application security does Microsoft incorporate these days?

A

Microsoft incorporates Transport Layer Security (TLS) into its HTTPS protocol (HTTP over TLS)

44
Q

There must be a way for both the web server and your browser to encrypt and decrypt each other’s data. How is this done?

A

the server sends a public key to your web browser so that the browser knows how to decrypt the incoming data

45
Q

Public keys are sent in what form?

A

a digital certificate

46
Q

Digital certificates (public keys) are signed by what? What does it guarantee?

A

a trusted certificate authority (CA) that guarantees that the public key you’re about to get is from the actual web server and not an impersonator

47
Q

Who issues the digital certificates?

A

companies such as Symantec, Comodo, etc

48
Q

What is a trusted root CA?

A

your web browser’s built-in list of trusted authorities

49
Q

What happens if a certificate comes in from a website that uses one of the trusted root CA in your browser?

A

you’ll just go to the secure page and a small lock will appear in the corner of the browser (won’t see anything happen)

50
Q

What happens if you receive a certificate that your browser thinks is fishy (expired, or browser doesn’t have a trusted root CA)?

A

the browser will warn you and ask you if you wish to accept the certificate

51
Q

What are examples of what invalid digital certificates can mean? (2)

A
  1. The site owner forgot to update it on time
  2. The site or your connection is compromised

(only add an exception if you know its safe, like using it to access a site on your organizations intranet)

52
Q

What are continuity plans?

A

how your organization prepares to continue operating in case its data and infrastructure is damaged by common issues (hardware failures, attacks, malware, fire, power outage, vandalism, failed air conditioner)

53
Q

2 things included in a continuity plan?

A
  1. redundancy
  2. resiliency