Ch 4. Securing Your Network Flashcards

(43 cards)

1
Q

HIDS

A

host based intrusion detection system; software installed on a system to detect attacks. It protects local resources on the host. A HIPS is an extension of HIDS and detects and blocks attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIDS

A

network based intrusion detection system; a device that detects attacks and raises alerts. A NIDS is installed on network devices, such as routers or firewalls. and monitors network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Port Mirror

A

a monitoring port on a switch. All traffic going through the switch is also sent to the port mirror.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Taps

A

monitoring ports on a network device. IDSs use taps to capture traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Signature Based Detection

A

a type of monitoring used on intrusion detection and intrusion prevention systems that detects attacks based on known attack patterns documented as attack signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Heuristic/Behavioral/Anomaly Based Detection

A

a type of monitoring that can detect unknown anomalies. They start with a performance baseline of normal behavior and then compare network traffic against this baseline. When traffic differs significantly from the baseline, the IDS sends an alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

inline

A

an IPS is inline with traffic. All traffic passes through the IPS and the IPS can block malicious traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

out-of-band

A

an IDS is out-of-band. It monitors the network traffic, but the traffic doesn’t go through the IDS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RAT

A

Remote Access Trojan; malware that allows an attacker to take control of a system from a remote location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL/TLS Accelerator

A

device used to handle TLS traffic. Severs can off-load TLS traffic to improve performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSL Decryptor

A

device used to create separate SSL (or TLS) sessions. They allow other security devices to examine encrypted traffic sent to and from the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SDN

A

software defined network; a method of using software and virtualization technologies to replace hardware routers. SDNs separate the data and control planes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Honeypot

A

a server that’s left open or appears to have been sloppily locked down, allowing an attacker relatively easy access. Diverts the attacker away from the live network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IEEE 802.1x

A

a server that provides port-based authentication, ensuring that only authorized clients can connect to a network. It prevents rogue devices from connecting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AP

A

access point; a device that connects wireless clients to wireless networks. Sometimes called a wireless access point (WAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fat AP

A

includes everything needed to connect wireless clients to a wireless network. Typically includes features such as a routing component, NAT, DHCP, ACLs, etc. Must be configured separately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Thin AP

A

managed by a wireless controller who configures the AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SSID

A

service set identifier; the name of a wireless network. SSIDs can be set to broadcast so users can easily see it. Disabling it hides it from casual users

19
Q

WPA/WPA2

A

Wi-Fi Protected Access; a wireless security protocol. Supports CCMP for encryption, which is based on AES.

20
Q

PSK

A

Pre-shared Key; a wireless mode that uses a pre-shared key for security.

21
Q

Enterprise

A

a wireless mode that uses an 802.1x server for security. It forces users to authenticate with a username and password

22
Q

Captive Portal

A

a technical solution that forces clients using web browsers to complete a specific process before it allows them access to a network

23
Q

Disassociation Attack

A

removes a wireless client from a wireless network; a disassociation frame is sent to the AP to terminate the connection, the client must then reauthenticate

24
Q

WPS Attack

A

discovers the eight-digit WPS pin and uses it to discover the AP passphrase

25
Rogue AP
an AP places within a network without official authorization
26
Evil Twin
a rogue AP with the same SSID as a legitimate AP.
27
Jamming
the transmission of noise or another radio signal on the same frequency used by a wireless network
28
IV Attack
a wireless attack that attempts to discover the initialization vector
29
NFC Attack
an attacker uses an NFC reader to capture data from another NFC device. Near Field Communication is a group of standards used on mobile devices that allow them to communicate with other mobile devices when they are close
30
Bluejacking
the practice of sending unsolicited messages to nearby Bluetooth devices
31
Bluesnarfing
refers to the unauthorized access to, or then of information from, a Bluetooth device.
32
Replay Attack
an attacker captures data sent between two entities, modifies it, and then attempts to impersonate one of the parties by replaying the data
33
Split Tunnel
a VPN administrator determines what traffic should use the encrypted tunnel
34
Full Tunnel
all traffic goes through the encrypted tunnel while the user is connected to the VPN
35
NAC
Network Access Control; provide continuous security monitoring by inspecting computers and preventing them from accessing the network if they don't pass the inspection
36
Permanent Agent
is installed on the client and stays on the client
37
Dissolvable Agent
downloaded and run on the client when the client logs on remotely
38
PAP
Password Authentication Protocol; used with Point-to-Point (PPP) to authenticate clients. A weakness is that it sends passwords over a network in cleartext
39
CHAP
Challenge Handshake Authentication Protocol; uses PPP and authenticates remote users because it does not send passwords with cleartext
40
MS-CHAPv2
Microsoft CHAP; performs mutual authentication, the client authenticates the server and the server authenticates the client
41
RADIUS
Remote Authentication Dial-In User Service; a centralized authentication service
42
TACACS+
the CISCO alternative to RADIUS; it encrypts the entire authentication process and uses multiple challenges and responses between the client and the sever
43
Diameter
an extension of RADIUS that supports many additional capabilities, including securing transmission with EAP