CISSP Domain 4: Assessing and Implementing Secure Principles in Network Architectures Flashcards
What’s Keep it Simple?
- complexity is the worst enemy of security
- best-in-suite over best-in-breed solutions are one approach used to simplify defense in-depth
- simplicity helps to avoid configuration mistakes
- enables organizations to move forward improving incrementally, rather than demanding perfection
What does Best-in-Suite mean?
- a software solution that offers a comprehensive and integrated set of functionalities within a single package or suite
- a software vendor strives to deliver a cohesive and unified solution where different modules or components seamlessly work together
What does Best-in-Breed mean?
- software approach that focuses on selecting and integrating individual software applications or solutions that are considered the best or most specialized in their respective domains
- prioritizes functionality and performance over integration and consolidation
Which IEEE standard defines bluetooth?
802.15
What type of network architecture is bluetooth?
Personal Area Network (PAN)
How are connections set up with bluetooth?
with pairing where primary device scans the 2.4 GHz radio frequencies for available devices
What mechanism prevents accidental pairing?
4 digit code (often 0000)
What’s bluejacking?
- annoyance where pranksters push unsolicited messages to engage or annoy other nearby bluetoth users by taking advantage of a loophole in the technology’s messaging options
What’s bluesnarfing?
- data theft
- thieves wirelessly connect to some early bluetooth enabled mobile devices without the owner’s knowledge to download and/or alter phonebooks, calendars or worse
What’s bluebugging?
- attack that grants hackers remote control over he feature and functions of a bluetooth device
- could include the ability to turn on the microphone to use the phone as an audio bug
How do wireless networks announce their SSID on a regular basis?
broadcast with a beacon frame
Hiding SSID is considered which security technique?
security through obscurity
What does SSID stand for?
Service Set Identifier
What is TKIP and what does it stand for?
- Temorary Key Integrity Protocol
- designed to replace WEP without the need to replace legacy hardware
What was TKIP implemented to?
802.11 wireless networking under the name WPA (WI-Fi Protected Access)
What’s CCMP?
- Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
- uses AES 128
- created to replace WEP and TKIP (WPA)
- used with WPA2, which replaced WEP and WPA
What’s Fibre Channel?
a form of network data storage solution (SAN) or NAS, that allows for high-speed file transfers
What’s Fibre Channel Over Ethernet (FCoE)?
used to encapsulate Fibre Channel communication over Ethernet networks
What’s iSCSI
- stands for Internet Small Computer System Interface
- networking storage standard based on IP
What’s Site Survey?
process of investigating the presence of strength and reach of wireless access points deployed in the environment
What does EAP stand for?
Extensible Authentication Protocol.
What’s PEAP?
- encapsulates EAP methods with a TLS tunnel that provides authentication and potenially encryption
- P stands for Protected
What’s LEAP?
- Cisco’s proprietary alternative to TKIP and WPA
- developed to address deficincies in TKIP before 802.11i/WPA2 system was ratified as a standard
What are different antena types? (7)
- monopole
- panel
- dipole
- loop
- cantenna
- yagi
- parabolic