final review Flashcards

(52 cards)

1
Q

Mobile devices

A

requires a non-wired means of connection to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How mobile devices connect to a network?

A

Manageable by the enterprise architecting the connection aspect of the wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cellular

A

Connections use mobile telephony circuits (4G,LTE,3G,5G)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WI-FI

A

Radio communication methods developed under the Wi-Fi alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where do wi-fi systems exist?

A

Exist on 2.4GHz and 5GHz frequency spectrums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bluetooth

A

Short-to-medium-range, low-power wireless protocol that transmits in the 2.4GHz band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless Protocol Bands

Wi-Fi series

A

Most Common, 802.11 Wireless LAN standards certified by Wi-Fi Alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless Protocol Bands

WiMax

A

802.16 wireless network standards ratified by the WiMax Forum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless Protocol Bands
Zigbee

A

Low-Power, personal area network, described by the IEEE 802.15.4 series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Point

A

AP

Point of entry for radio-based network signals into and out of a network

Can operate in several different modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Service Set Identifier

A

SSID
Name of wireless network
Setting should limit access only to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fat Access points

A

Standalone access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Thin Access points

A

Controller based Access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Controller Based

A

Controller-based solutions allow for centralized management and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Standalone

A

Standalone points have substantial capabilities with respect to authentication, encryption, and channel management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Signal Strength

A

Wireless signal usability is directly related to signal strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Band Selection/Width

A

Today’s wireless environments employ multiple different bands, each with different bandwidths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Antenna Types and Placement

A

Standard Access point is equipped with an omnidirectional antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can you solve wireless networking problems caused by weak signal strength

A

Weak signal strength can sometimes be solved by installing upgraded-Wi-Fi radio antennas on the access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Power Level Controls

A

Wi-Fi power levels can be controlled by the hardware for a variety of reasons

The lower the power used, the less opportunity for interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does a replay attack occur?

A

A replay attack occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later times.

22
Q

How to prevent a replay attack?

A

The best way to prevent a replay attack is with encryption, cryptographic authentication, and timestamps

23
Q

What is an evil twin?

A

An evil twin attack against the wireless protocol via substitute hardware

24
Q

How does an evil twin attack occur?

A

Uses an access point owned by an attacker that usually has been enhanced to look like a better connection

25
intrusion detection system
(IDS) is a security system that detects inappropriate or malicious activity on a computer or network?
26
Foundation for a layered network security approach
Starts with a well-secured system Some of the more complicated and interesting types of network/data security devices are IDSs
27
IDS categories
HIDS and NIDS
28
Host-Based IDS
Examines activity on an individual system (or host) Concerned with an individual system
29
Network-based IDS
Examines Activity on the Network itself It has visibility only into the traffic crossing the network link it is monitoring and typically has no idea of what is happening on individual systems
30
IDS Traffic Collector (or sensor)
Collects activity/events for the IDS to examine
31
IDS Analysis engine
examines collected network traffic and compares it to known patterns of suspicious or malicious activity
32
IDS signature database
collection of patterns and definitions of known suspicious or malicious activity
33
IDS user interface and reporting
interfaces with the human element and provides alerts when appropriate
34
Network-Based IDSs Components
Traffic Collector Analysis engine Signature Database Reports User interface
35
Advantage of NIDS
Providing IDS coverage requires fewer systems Deployment, maintenance, and upgrade costs are usually lower A NIDS has visibility into all network traffic and can correlate attacks among multiple systems
36
Disadvantage of NIDS
Ineffective when traffic is encrypted Can't see traffic that does not cross it Must be able to handle high volumes of traffic does not know about the activity on the hosts themselves
37
Advantage of HIDS
Very operating system-specific with more detailed signatures reduce false-positive rates examine data after it has been decrypted very application specific determine whether or not an alarm may impact that specific system
38
Disadvantage of HIDS
Must have a process on every system you want to watch high cost of ownership and maintenance use local system resources have a very focused view and cannot relate to activity around them if logging only locally, could be compromised or disabled
39
Hardening
Process of securing and preparing a system for the production environment
40
To try to make systems, servers, workstations, networks, and applications more secure
Follow a process of defining their necessary uses and aligning security controls to limit their functionality. This process is called hardening. Once this is determined, you have a system baseline that you can compare changes over the course of a system’s lifecycle
41
Operating System
(OS) Basic software that handles things such as input, output, display, memory management, and all the other highly detailed tasks
42
Network Operating System
NOS Operating system that includes additional functions and capabilities to assist in connecting computers and devices
43
Protection rings Devised to deal with security issues associated with
Timesharing operations
44
Protection Rings Enforced by hardware, software, or a combination, and serve to act as a means of
Managing privilege in a hierarchical manner
45
Protection Rings The use of rings separates elements such as applications from directly interfacing with the hardware without going through the
OS and, specifically, the security kernel
46
Ring Layers layers from 0-3
Kernel, device drivers, device drivers, applications
47
OS Security
The operating system itself is the foundation of system security The security kernel (i.e. reference monitor) is the component of the operating system that enforced OS security policies
48
OS types
Network, server, and workstation Appliance, kiosk, and mobile OS
49
Trusted Operating system
Designed to allow multilevel security in its operation This is further defined by its ability to meet a series of criteria required by the U.S Government
50
Patch Management
The process used to maintain systems in an up-to-date fashion Vendors typically follow a hierarchy for updates -hotfix -patch -service pack
51
Baselining is establishing software's base state
The resulting product is a baseline that describes the capabilities of the software; this is not necessarily secure
52