Lesson 7 Configuring SOHO Network Security Flashcards

(65 cards)

1
Q

What are the three properties of secure information?

A
  • Confidentiality: means that certain information should only be known to certain people.
  • Integrity: means that the data is stored and transferred as intended and that any modification is authorized.
  • Availability: means that information is accessible to those authorized to view or modify it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cybersecurity?

A

Protection of computer systems and digital information resources from unauthorized access, attack, theft, or data damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does shoulder surfing in cybersecurity mean?

A

Shoulder surfing is a social engineering tactic to obtain someone’s password or PIN by observing him or her as he or she types it in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does tailgating mean in cybersecurity?

A

Tailgating is a means of entering a secure area without authorization by following closely behind the person who has been allowed to open the door or checkpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does piggybacking mean in cybersecurity?

A

Piggybacking means that the attacker enters a secure area with an employee’s permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spear phishing?

A

Email-based or web-based form of phishing which targets specific individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is whaling?

A

An email-based or web-based form of phishing which targets senior executives or wealthy individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is vishing?

A

Social engineering attack where the threat actor extracts information while speaking over the phone or leveraging IP-based voice messaging services (VoIP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an evil twin attack?

A

Wireless access point that deceives users into believing that it is a legitimate network access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a footprinting threat?

A

Footprinting is a phase in an attack or penetration test in which the attacker or tester gathers information about the target before attacking it. It is an information-gathering threat in which the attacker attempts to learn about the configuration of the network and security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an on-path attack?

A

An on-path attach is where the threat actor makes an independent connection between two victims and is able to read and possibly modify traffic. It is a specific type of spoofing where the threat actor can covertly intercept traffic between two hosts or networks. An example is an evil twin attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a DoS attack?

A

Denial of Service attack is any type of physical, application, or network attack that affects the availability of a managed resources. A DoS attack tries to overload a service by bombarding it with spoofed requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a DDoS?

A

Distributed denial of service is an attack that uses multiple compromised hosts (a botnet) to overwhelm a service with request or response traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a botnet?

A

A botnet is a group of hosts or devices that have been infected by a control program called a bot that enables attackers to exploit the hosts to mount attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a dictionary password attack?

A

Dictionary is a type of password attack that compares encrypted passwords against a predetermined list of possible password values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a brute force attack?

A

Brute force is a type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to crack encrypted passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an XSS attack?

A

A cross-site scripting (XSS) attack is malicious script hosted on the attacker’s site or coded in a link injected onto a trusted site designed to compromise clients browsing the trusted site, circumventing the browser’s security model of trusted zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a SQL injection attack?

A

A SQL injection attack is an attack that injects a database query into the input data directly at a server by accessing the client side of the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a hash?

A

A hash is a short representation of data. A hash function takes any amount of data as input and produces a fixed-length value as output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a cryptographic hash?

A

A cryptographic hash performs the hash process as a one-way function that makes it impossible to recover the original value from the hash. Cryptographic hashes are used for secure storage of data where the original meaning does not have to be recovered (ie passwords).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the two most used cryptographic hash algorithms?

A
  • Secure Hash Algorithm (SHA)
    -Message Digest (MD5) - older and getting phased out
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a symmetric encryption?

A

A symmetric encryption is a two-way encryption scheme in which encryption and decryption are both performed by the same key. Aka shared-key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is asymmetric encryption cipher?

A

Asymmetric encryption is a cipher that uses public and private keys. The keys are mathematically linked, using either Rivel, Shamir, Adleman (RSA) or elliptic curve cryptography (ECC) alogrithims, but the private key is not derivable from the public one. An asymmetric key cannot reverse the operation it performs, so the public key cannot decrypt what it has encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a digital signature?

A

A digital signature is a message digest encrypted using the sender’s private key that is appended to a message to authenticate the sender and prove message integrity. It proves that a message or digital certificate has not been altered or spoofed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is key exchange?
Key exchange is any method by which cryptographic keys are transferred among users, thus enabling the use of a cryptographic algorithm.
26
Confidentiality and integrity are two important properties of information stored in a secure retrieval system. What is the third property?
Availability—information that is inaccessible is not of much use to authorized users. For example, a secure system must protect against denial of service (DoS) attacks.
27
True or false? The level of risk from zero-day attacks is only significant with respect to EOL systems.
False. A zero-day is a vulnerability that is unknown to the product vendor and means that no patch is available to mitigate it. This can affect currently supported as well as unsupported end-of-life (EOL) systems. The main difference is that there is a good chance of a patch being developed if the system is still supported, but almost no chance if it is EOL.
28
A threat actor crafts an email addressed to a senior support technician inviting him to register for free football coaching advice. The website contains password-stealing malware. What is the name of this type of attack?
A phishing attack tries to make users authenticate with a fake resource, such as a website. Phishing emails are often sent in mass as spam. This is a variant of phishing called spear phishing because it is specifically targeted at a single person, using personal information known about the subject (his or her football-coaching volunteer work).
29
You are assisting with the development of end-user security awareness documentation. What is the difference between tailgating and shoulder surfing?
Tailgating means following someone else through a door or gateway to enter premises without authorization. Shoulder surfing means covertly observing someone type a PIN or password or other confidential data.
30
You discover that a threat actor has been able to harvest credentials from some visitors connecting to the company’s wireless network from the lobby. The visitors had connected to a network named “Internet” and were presented with a web page requesting an email address and password to enable guest access. The company’s access point had been disconnected from the cabled network. What type of attack has been perpetrated?
This is an evil twin attack where the threat actor uses social engineering techniques to persuade users to connect to an access point that spoofs a legitimate guest network service.
31
A threat actor recovers some documents via dumpster diving and learns that the system policy causes passwords to be configured with a random mix of different characters that are only five characters in length. To what type of password cracking attack is this vulnerable?
Brute force attacks are effective against short passwords. Dictionary attacks depend on users choosing ordinary words or phrases in a password.
32
What type of cryptographic key is delivered in a digital certificate?
A digital certificate is a wrapper for a subject's public key. The public and private keys in an asymmetric cipher are paired. If one key is used to encrypt a message, only the other key can then decrypt it.
33
What is WPA?
Wi-Fi Protected Access is the standards for authenticating and encryption access to Wi-Fi networks.
34
What is TKIP?
Temporal Key Integrity Protocol is a mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP (wired equivalent privacy) standard.
35
What is the Advanced Encryption Standard (AES)?
Symmetric 128-, 192-, or 256-bit block cipher used for bulk encryption in modern security standards, such as WPA2, WPA3, and TLS.
36
What is CCMP?
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is an encryption protocol used for wireless LANs that addresses the vulnerabilities of the WEP protocol.
37
What is SAE?
Simultaneous authentication of equals (SAE) is a personal authentication mechanism for Wi-Fi networks introduced with WPA3 to address vulnerabilities in the WPA-PSK method.
38
What is a PSK?
Pre-shared key is a wireless netowrk authentication mode where a passphrase-based mechanism is used to allow group authentication to a wireless network. The passphrase is used to derive an encryption key.
39
What is EAP?
Extensible Authentication Protocol is a framework for negotiating authentication methods that enables systems to use hardware-based, identifiers, like fingerprint scanners or smart card readers, for authentication, and establish secure tunnels through which to submit credentials. EAP allows the use of different mechanisms to authenticate against a network directory.
40
What is RADIUS?
Remote Authentication Dial-in User Service (RADIUS) is AAA protocol used to manage remote and wireless authentication infrastructures.
41
What is TACACS+?
Terminal Access Controller Access Control System Plus (TACACS+) is an AAA protocol developed by Cisco that is often used to authenticate to administrator accounts for network appliance management.
42
What is Kerberos?
Kerberos is a single sign-on authentication and authorization service that is based on a time-sensitive, ticket-granting system.
43
True or false. TKIP represents the best available wireless encryption and should be configured in place of AES if supported.
False. Advanced Encryption Standard (AES) provides stronger encryption and is enabled by selecting Wi-Fi Protected Access (WPA) version 2 with AES/CCMP or WPA3 encryption mode. The Temporal Key Integrity Protocol (TKIP) attempts to fix problems with the older RC4 cipher used by the first version of WPA. TKIP and WPA1 are now deprecated.
44
True or false? WPA3 personal mode is configured by selecting a passphrase shared between all users who are permitted to connect to the network.
True. WPA3-Personal uses group authentication via a shared passphrase. The simultaneous authentication of equals (SAE) mechanism by which this passphrase is used to generate network encryption keys is improved compared to the older WPA2 protocol, however.
45
What two factors must a user present to authenticate to a wireless network secured using EAP-TLS?
Extensible Authentication Protocol (EAP) allows for different types of mechanisms and credentials. The Transport Layer Security (TLS) method uses digital certificates installed on both the server and the wireless station. The station must use its private key and its certificate to perform a handshake with the server. This is one factor. The user must authenticate to the device to allow use of this private key. This device authentication—via a password, PIN, or bio gesture—is the second factor.
46
In AAA architecture, what type of device might a RADIUS client be?
AAA refers to Authentication, Authorization, and Accounting and the Remote Access Dial-in User Service (RADIUS) protocol is one way of implementing this architecture. The RADIUS server is positioned on the internal network and processes authentication and authorization requests. The RADIUS client is the access point, and it must be configured with the IP address of the server plus a shared secret passphrase. The access point forwards authentication traffic between the end-user device (a supplicant) and the RADIUS server but cannot inspect the traffic.
47
What is SSID?
Service Set ID (SSID) is a simple, case-sensitive name by which users identify the WLAN
48
What is content filtering?
Content filtering is a security measure performed on email and Internet traffic to identify and block suspicious, malicious and/or inappropriate content in accordance with an organization's policies.
49
What is port forwarding?
Port forwarding is the process in which a router takes requests from the Internet for a particular application (such as HTTP) and sends them to a designated host on the LAN.
50
What is port mapping?
Port mapping is a type of port forwarding where the external port is forwarded to a different internal port on the LAN host
51
What is port triggering?
Port triggering is a mechanism to configure access through a firewall for applications that require more than one port. Basically, when the firewall detects activity on outbound port A destined for a given external IP address, it opens inbound access for the external IP address on port B for a set period.
52
What is UPnP?
Universal Plug-and-Play (UPnP) is a protocol framework allowing network devices to autoconfigure services, such as allowing a games console to request appropriate settings from a firewall
53
What is a screened subnet?
Screened subnet is a segment isolated from the rest of a private network by one or more firewalls that accepts connections from the Internet over designated ports. A screened subnet can also be referred to by the deprecated terminology demilitarized zone (DMZ).
54
What does DMZ mean for many home router vendors?
DMZ configuration is likely to refer to a computer on the LAN that is configured to receive communications for any ports that have not been forwarded to other hosts. When DMZ is used in this sense, it means "not protected by the firewall" as the host is fully accessible to other Internet hosts (though it could be installed with a host firewall instead).
55
You have selected a secure location for a new home router, changed the default password, and verified the WAN IP address and Internet link. What next step should you perform before configuring wireless settings?
Check for a firmware update. Using the latest firmware is important to mitigate risks from software vulnerabilities.
56
You are reviewing a secure deployment checklist for home router wireless configuration. Following the CompTIA A+ objectives, what additional setting should be considered along with the following four settings? - Changing the service set identifier (SSID) - Disabling SSID broadcast - Encryption settings - Changing channels
Disabling guest access. It might be appropriate to allow a guest network depending on the circumstances, but the general principle is that services and access methods that are not required should be disabled.
57
You are assisting a user with setting up Internet access to a web server on a home network. You want to configure a DHCP reservation to set the web server’s IP address, allow external clients to connect to the secure port TCP/443, but configure the web server to listen on port TCP/8080. Is this configuration possible on a typical home router?
Yes. You need to configure a port-mapping rule so that the router takes requests arriving at its WAN IP for TCP/443 and forwards them to the server’s IP address on TCP/8080. Using a known IP address for the server by configuring a Dynamic Host Configuration Protocol (DHCP) reservation simplifies this configuration. The home router’s DHCP server must be configured with the media access control (MAC) address or hardware identifier of the web server.
58
A different user wants to configure a multiplayer game server by using the DMZ feature of the router. Is this the best configuration option?
Probably not. Using a home router’s “demilitarized zone” or DMZ host option forwards traffic for all ports not covered by specific port-forwarding rules to the host. It is possible to achieve a secure configuration with this option by blocking unauthorized ports and protecting the host using a personal firewall, but using specific port-forwarding/mapping rules is better practice. The most secure solution is to isolate the game server in a screened subnet so that is separated from other LAN hosts, but this typically requires multiple router/firewalls.
59
What are bollards?
Bollards are sturdy vertical post installed to control road traffic or designed to prevent ram-raiding and vehicle-ramming attacks.
60
What is access control vestibule?
Access control vestibule is a secure entry system with two gateways, only one of which is open at any one time.
61
What is a magnetometer?
A magnetometer is a hand-held or walkthrough metal detector designed to detect concealed weapons.
62
You are assisting with the design of a new campus building for a multinational firm. On the recommendation of a security consultant, the architect has added closely spaced sculpted stone posts with reinforced steel cores that surround the area between the building entrance and the street. At the most recent client meeting, the building owner has queried the cost of these. Can you explain their purpose?
These bollards are designed to prevent vehicles from crashing into the building lobby as part of a terrorist or criminal attack. The security consultant should only recommend the control if the risk of this type of attack justifies the expense.
63
Katie works in a high-security government facility. When she comes to work in the morning, she places her hand on a scanning device installed at a turnstile in the building lobby. The scanner reads her palmprint and compares it to a master record of her palmprint in a database to verify her identity. What type of security control is this?
Biometric authentication deployed as part of a building's entry-control system. 
64
The building will house a number of servers contained within a secure room and network racks. You have recommended that the provisioning requirement includes key-operated chassis faceplates. What threats will this mitigate?
A lockable faceplate controls who can access the power button, external ports, and internal components. This mitigates the risk of someone gaining access to the server room via social engineering. It also mitigates risks from insider threat by rogue administrators, though to a lesser extent (each request for a chassis key would need to be approved and logged).
65