4.1 Flashcards

Secure baselines, hardening targets, securing wireless and mobile, wireless security settings, application security

1
Q

A template of a secure configuration that can be modified in order to best serve the specific application it is being used for.

They are often available from the manufacturer of the device or application.

A

Security baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True/False

Most security baselines rarely need updating/changing

A

True

However, some baselines may require frequent updating due to discovered vulnerabilities or new software needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 common hardening techniques for mobile devices

A

Update

Segmentation (user vs company data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True/False

Mobile devices typically have hardening checklists available from the manufacturer

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4 ways to harden a workstation

A

Keep it updated

Automate the monthly security patches (but make sure to test them)

Connect to a policy management system (AD group policy, etc.)

Remove unnecessary software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2 ways to harden network infrastructure devices

A

Configure authentication - don’t use defaults!

Check with the manufacturer for security updates

(Because these are purpose-built devices, they don’t get updated often. But any updates are always important.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4 ways to harden/secure cloud infrastructure

A

Secure the cloud management workstation

Implement least privilege

Configure EDR (all devices accessing the cloud should be secure)

Always have backups (you can backup to a separate cloud provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

4 ways to harden/secure servers

A

Update and patch

Secure accounts (least privilege, password requirements)

Limit network access (firewall)

Monitor and secure (antivirus, antimalware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SCADA stands for

A

Supervisory Control and Data Acquisition System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1 way to harden/secure SCADA/ICS

A

Extensive segmentation - no access from the outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 ways to harden/secure embedded systems

A

Security patches

Segmentation on their own network

Firewall in front of the segment

Note: Upgrading/modifying an existing embedded system is not always an option. Remember that embedded systems don’t usually allow access into the OS. Things like televisions and watches are easy, but other things not so much.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 ways to harden/secure RTOSs

A

Isolate the system from the rest of the network

Run with the minimum amount of services

Use secure communication (firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 ways to harden/secure IoT devices

A

Change default accounts and configurations

Deploy updates quickly

Segment IoT devices on their own VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The inspection of a location that involves what wireless networks are nearby, determining the existing wireless spectrum, identifying existing access points, and a plan for how to work around existing wireless frequencies.

A

Site survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A two-dimensional diagram that shows wireless AP signal coverage.

A

Heat map

AKA Wi-Fi coverage map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MDM stands for

A

Mobile Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BYOD stands for

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A system that allows centralized management of mobile devices. Can set policies on features (camera, apps, data, etc.), enforce segmentation, and manage access control (screen locks, PINs).

A

MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A policy that allows employees to bring their own personal device to be used partially for work. The device will be managed via an MDM.

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

COPE stands for

A

Corporate owned, personally enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A policy where the organization purchases the device for employees to use as both a personal and corporate device.

A

COPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Difference between COPE and CYOD

A

CYOD allows the employee to choose which device they want to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CYOD stands for

A

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PAN stands for

A

Personal Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
PAN is AKA
Bluetooth
25
MIC stands for
Message Integrity Check
26
3 methods to secure a wireless network
Authenticate users before granting access Encrypt all confidential communication Verify integrity of communication (MIC)
27
True/False WPA2 is insecure because it is vulnerable to brute force attacks
True
28
Which cipher mode does WPA3 use? This encryption is stronger than that of WPA2.
GCMP
29
GCMP stands for
Galois/Counter Mode Protocol
30
2 security services that GCMP provides
Data confidentiality with AES MIC with GMAC (Galois Message Authentication Code)
31
SAE stands for
Simultaneous Authentication of Equals
32
The authentication process used in WPA3
SAE
33
A derivation of Diffie-Hellman key exchange with an authentication component. Everyone uses a different session key even if they each use the same pre-shared key. Eliminates the need for four-way handshakes and hashes, so it is not vulnerable to brute force attacks.
SAE
34
SAE is AKA
Dragonfly handshake
35
True/False A PSK is the same thing as a network password
False A PSK is a super-long series of seemingly random letters and numbers generated when a device joins a network through a wireless AP. The process begins when a user logs into the network using the SSID (name if the network) and password. The PSK is derived from both the SSID and password, which is then used in conjunction to create an even more complex encryption key to protect data sent over the network. A PSK plays an essential part in the encryption process that keeps network traffic secure.
36
PSK stands for
Pre-shared key
37
The 2 most common methods of securing a network
Pre-shared password (PSK) Centralized authentication (802.1X)
38
WPA3-Personal / WPA3-PSK provides authentication via
PSK
39
WPA3-Enterprise / WPA3-802.1X provides authentication via
Individual authentication credentials with an authentication server (ex. RADIUS, LDAP, TACACS+, etc.)
40
A framework that identifies users, authenticates them, identifies their permissions, and logs what resources that user accessed.
AAA framework
41
RADIUS stands for
Remote Authentication Dial-In User Service
42
One of the most common AAA protocols that is supported on a wide variety of platforms and devices. It centralizes authentication for users--through routers, switches, firewalls, VPNs, and 802.1X network access.
RADIUS
43
When a network says it is an "open system" that means...
No authentication/password is required
44
NAC stands for
Network Access Control
45
A control that prevents network access until authentication is successful (802.1X is just one type of this)
NAC
46
802.1X NAC is used in conjunction with...
AAA server (RADIUS, LDAP, TACACS+, etc.) Allows administrators centralized management for disabling accounts, forcing password changes, etc.
47
A framework used with 802.1X that allows manufacturers to customize authentication measures for their devices to meet requirements. Combined with 802.1X to provide authentication to the network.
EAP
48
EAP stands for
Extensible Authentication Protocol
49
A security process that prevents unexpected input from being interpreted by an application
Input validation
50
A type of input validation that raises an error when the input does not match what is expected. (ex. SSN should be 9 characters and only have integers.)
Normalization
51
An automated tool that inputs random data of random types to see what the application does. If the application behaves unexpectedly, the developer can fix whatever issue it has.
Fuzzer
52
Small pieces of information that are stored on your browser that track the websites you visited. They are used for personalization and session management.
Cookies
53
Difference between cookies and secure cookies
Secure cookies will only be transferred when using a secure connection (ex. HTTPS)
54
SAST stands for
Static Application Security Testing
55
An automated analysis tool that identifies known vulnerabilities (buffer overflows, database injections, etc.)
SAST
56
A way to ensure that the code you are installing is the same code that was deployed by the developer/manufacturer
Code signing
57
A method of isolating a system for the purposes of testing data without affecting the production network.
Sandbox
58
Real-time detection of application use that can indicate who is accessing the application, blocked attack attempts, identify anomalous file transfers or increased permissions, and log events.
Application security monitoring
59
2 vulnerabilities that CANNOT be identified by a SAST tool.
Authentication security Insecure cryptography