Network Security Flashcards

1
Q

Confidentiality

A

Prevents disclosure of information to unauthorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity

A

Ensuring that data has not been modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Availability

A

Information is accessible to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CVE

A

Common Vulnerabilities and Exposures - a database containing known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Zero-Day Vulnerability

A

One that has never been detected or published

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Least privilege

A

Giving people just enough privileges to do their jobs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Role-based Access

A

Your access is based on your role in the organization. In Windows, use Groups to provide this type of access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zero Trust

A

Everything must be verified. Nobody is trusted until authentication is provided by the user. Systems are constantly monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network segmentation enforcement

A

Physical segmentation (using separate devices) or VLANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Screened subnet

A

Formerly a “DMZ” - a separate subnet containing assets that outside users need access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Separation of duties

A

Limit what a single person can do: split knowledge, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network access Control

A

IEEE 802.1X - Port-based Network Access Control (NAC). The physical ports require authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Honeypot

A

Fake virtual systems put in place to lure attackers so they can be monitored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Multifactor authentication

A

Something you are
Something you have
Something you know
Somewhere you are
Something you do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TACACS+

A

Remote authentication protocol. Released as an open standard in 1993.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSO

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RADIUS

A

Common AAA protocol; supported on wide variety of devices. Centralized authentication for users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

LDAP

A

Protocol for reading/writing directories over an IP network. Can be used as authentication protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Kerberos

A

Network authentication protocol; authenticate once (SSO). Mutual authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Local authentication

A

Credentials are stored locally on the machine you’re trying to access.

21
Q

802.1X

A

Port-based Network Access Control; no access to network until you authenticate.

22
Q

EAP

A

Extensible Authentication Protocol; an authentication framework that integrates with other systems.

23
Q

Threat Assessment

A

Research the threats and make decisions based on the information. Then invest in most appropriate protection.

24
Q

Vulnerability Assessment

A

Minimally invasive process to identify potential vulnerabilities (vulnerability scanner); test from outside and inside

25
Q

Penetration Testing

A

A simulated attack on a system.

26
Q

Posture Assessment

A

Checks if a BYOD device is trusted, healthy, clean, etc., and has proper apps installed and settings enabled.

27
Q

Risk Assessment

A

Identify assets that can be affected by an attack.

28
Q

SIEM

A

Security Information and Event Management - a log of security events and information.

29
Q

Denial of Service

A

When a particular service is forced to fail (usually by overloading it)

30
Q

On-Path Attack

A

(Formerly Man-in-the-middle attack). An attacker redirects traffic (for monitoring) which then gets passed to the destination.

31
Q

ARP Poisoning

A

An attacker can pretend to be a router by responding to ARP requests with its own MAC

32
Q

Switch spoofing

A

Switch ports can be configured as access port or trunk port. Automatic config of these can lead to an attacker plugging in a laptop and negotating trunk access.

33
Q

Double tagging

A

Packets are crafted with two VLAN tags. The first native VLAN tag is removed by one switch, and the second one is visible to a second switch. One-way traffic. To mitigate, don’t put devices on native VLAN.

34
Q

Rogue DHCP server

A

Non-authorized DHCP server handing out IP addresses. DHCP snooping can prevent this.

35
Q

Rogue access point

A

An unauthorized wireless access point can lead to unauthorized access to your network. 802.1X can prevent this.

36
Q

Wireless evil twin

A

A rogue AP that looks legitimate but is actually malicious. Encryption can prevent these from stealing information.

37
Q

Wireless deauthentication

A

Attackers can send specially crafted frames to disconnect clients, using 802.11 management frames.
802.11w encrypts management frames to mitigate this.

38
Q

Secure SNMP

A

SNMPv3 encrypts traffic, but not all devices support it.

39
Q

RA Guard

A

Router Advertisement (IPv6) Guard
Prevents attackers from pretending to be a router and sending RA messages.

40
Q

DAI

A

Dynamic ARP Inspection - can prevent on-path attacks by using DHCP snooping.

41
Q

Control plane policing

A

Can secure a device using the control plane by limiting the amount and type of traffic or preventing types of traffic (Telnet, for example) that is allowed.

42
Q

Port Isolation

A

Limits the access between devices on different interfaces on a switch (even if they’re on the same VLAN).

43
Q

MAC Filtering

A

Can block unwanted devices, but is easy to circumvent by spoofing MAC addresses.

44
Q

Wireless client isolation

A

Devices connected to the network can get on the Internet but not see each other

45
Q

EAP

A

Extensible Authentication Protocol - a framework that can be used for wireless authentication

46
Q

VPN Concentrator

A

Device that VPN clients connect to (often integrated into a firewall)

47
Q

Remote Desktop Protocols

A

RDP (Windows, but has clients for MacOS, Linux, etc.)
VNC

48
Q

Out of band management

A

“Direct” connection (serial/USB), console connection, etc.