Chapter 4 Questions Flashcards

1
Q

What is the CVE list?

A

The Common Vulnerabilities and Exposures List.

It is a dictionary of publicly known security, Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Zero Day Vulnerability exploit?

A

A vulnerability that is unknown to the vendor. Or one where the vendor has not released a patch. If attackers discover such vulnerabilities, they are eager to exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a false positive?

A

A false positive is an alert or alarm on an event that is non-threatening, benign, or harmless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a false negative?

A

A false negative is when am attacker is actively attacking the network, but the system does not detect it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a honey pot?

A

A honey pot is a sweet-looking server. One that is left open and appears to have been sloppily locked down, allowing an attacker relatively easy access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Two goals of a honey pot?

A
  • divert attackers from the live network

- allow observation of an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a honey net?

A

A group of virtual servers contained within a single physical server, and the servers within this network are honeypots. Honey nets mimic the functionality of a live network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Passive IDS vs Active IDS?

A

Passive IDS just note/log the activity and send an alert to admin. Active IDS do all that AND change the environment of the network to stop and prevent the attack. An ACTIVE IDS IS BASICALLY AN IPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Isotropic antenna?

A

An Isotropic antenna is a theoretical concept where an antenna has a perfect three-dimensional radiation pattern of 360 degrees vertically and horizontally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a dipole antenna?

A

A dipole antenna is an actual antenna. Assuming it is standing vertically, it has a radiation pattern of 360 degrees horizontally and about 75 degrees vertically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Yagi/ directional antenna?

A

A Yagi antenna is a common type of directional antenna. The typically use a dipole, folded dipole or half wave dipole combined with additional elements such as a reflector or director elements. These additional elements focus the antenna in a single direction while also increasing the gain and refusing the radiation pattern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a wireless site survey?

A

A wireless site survey is the process of examining the wireless environment to identify potential issues. Administrators perform a site survey while planning and developing a WLAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is WPA2 encrypted with?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is 802.1x?

A

802.1x server is inter grated with a database of accounts and it provides port-based Authentication by requiring users and devices to authenticate before granting them access to a network. When systems connect, the 802.1x server challenges them to authenticate and prevents full network access until it receives valid credentials.
You can implement 802.1x as a RADIUS (remote Authentication dial-in user service) server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a captive portal?

A

A captive portal is a technical solution that forces clients using web browsers to complete a specific process before it allows them to access the network.

(They tell you to acknowledge that you know what their connection may be unsafe. Check the boxes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Give three common examples of captive portals.

A

1- Free Internet Access
(Such as given by hospitals, and other medical centers…users have to acknowledge and agree to abide by acceptable use policy. Usually by checking a box, and click a button to continue.
2- Paid Internet Access
( such as given by hotels, resorts….on a pay as you go basis. Users a redirected to a captive portal where they have to log on with pre-created account or credit card information to pay for access)
3- alternative to 802.1x
(Since it requires users to authenticate before granting access)

17
Q

Why is changing the default administrator password important?

A

If the default password isn’t changed, anyone who can access your WAP can log on and modify the configuration. An attacker can easily bypass an otherwise secure wireless network of the administrator password is not changed. The attacker can log on and simply turn off security.

*enable MAC filtering as well to address other security concerns

18
Q

What is war driving?

A

War driving is the practice of looking for a wireless network. Although more commonly down in cars, it can also be done just by walking around a large city.

19
Q

What is a Rogue Access Point?

A

A Rogue Access Point is a WAP placed within a Network by someone with some type of attack in mind.
These are also known as counterfeit Access points.

20
Q

What is Data Exfiltration?

A

Data Exfiltration is the unauthorized transfer of data from an organization to a location controlled by an attacker.

21
Q

What is Jamming (and interference)?

A

A type of DoS attack that prevents all users from connecting to a wireless network by interfering with the transmissions of the network.

22
Q

What is NFC? (Near Field Communication)

A

Near Filed Communication is a group of standards used on mobile devices that allow them to communicate with other mobile devices when they are close to them.

23
Q

Name some other forms is NFCc

A

Card reader technologies ( being able to make a purchase in some places just by placing your phone close to a credit card reader).

24
Q

What is Remote Access?

A

Remote Access is the group is technologies that allow users to access an internal network from remote locations.
RAS provide access through dial up or VPNS.

25
Q

What is Telephony?

A

Telephony is the use of telephone technologies to connect computers.

26
Q

What is a VPN?

A

A VPN allows a connection to a private network over a public network. (That public network tends to be the internet, but can also be leased lines from telecommunications companies).

27
Q

And what is the importance of a VPN Concentrator?

A

A VPN concentrator includes all services needed by a VPN server, including strong encryption and authentication techniques and supports large number of clients.

28
Q

Explain IPSec and a Tunneling Protocol

A

IPSec supports tunnel mode, which encrypts the entire IP packet. The mode used is VPN.

29
Q

Explain the two ways in which IPSec provides security.

A
1- Authentication
Includes AH (Authentication header) to allow each of the hosts in the IPSec conversation authenticate with each other before exchanging data. AH provides authentication and integrity. 

2- Encryption
IPSec includes Encapsulating Security Payload (ESP) to encrypt the data and provide confidentiality. ESP includes AH so it provides Authentication, integrity, and confidentiality.

30
Q

What is a Site to Site VPN? Benefit?

A

A site-to-site VPN includes two VPN servers that act as gateways for two Networks separated geographically.

**A benefit of the site-to-Site model is that it connects both networks without requiring additional steps on the part of the user. Users in a remote office can connect to servers in the headquarters location as easily as if the server were in the remote office.

31
Q

What is Access Control?

A

Access Control = restricting access to a Networks resources from unauthorized users.

32
Q

What does NAC (network access control) do?

A

NAC provides a measure of control for computers outside of the network. It ensures that clients meet predetermined characteristics prior to accessing a network. NAC systems often use ‘health’ as a metaphor, indicating that a client meets the predetermined characteristics (such as having up-to-date anti virus software installed, applying current patches, enabled fire walls, etc)

33
Q

What are common health conditions checked by NACs?

A

having up-to-date anti virus software installed, applying current patches, enabled fire walls, etc.

34
Q

What is a remediation Network?

A

*Also called a quarantine network
** if a client does not meet all ‘health’ requirements, the NAC does not allow then to join the network. Instead they are redirected to Remediation Network which include resources the client can use to get ‘healthy’. (Such as updating anti virus software, patches, updating virus signatures, etc).
The client can use these resources to improve its health and then try to access the network again.