pain points module 3 Flashcards

(27 cards)

1
Q

What are we scanning for?

A

We’re scanning for vulnerable systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Agent-Based Scanning: What it scans / How it works / Why it’s used / Advantages & drawbacks

A

Scans internal system data like OS version, patch status, installed apps.
Uses an installed software agent on each device that reports back to a central server.
Used when you need deep insight into individual system security states.
Advantage: Accurate. Disadvantage: Must install + manage agents on every endpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Agentless Scanning: What it scans / How it works / Why it’s used / Advantages & drawbacks

A

Scans from the outside: uses network probing to detect devices, OS, open ports, and exposed services.
A physical or virtual scanning system is placed on the network. It connects to devices via IP.
Used for quick audits, rogue device discovery.
Advantage: Fast, no install. Disadvantage: Surface-level only; limited visibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does “plug a scanner into your network” mean?

A

This usually means connecting a device (or running software on an existing device) that actively scans the local network for IP addresses and open services. It can be physical (e.g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a port (in networking)?

A

A port is a virtual/software doorway that lets specific kinds of traffic reach a device. Each service (like a website or remote login) listens on a specific port (e.g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a server (mid-level explanation)?

A

A server is any system that provides services or data to other devices (“clients”). This includes web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is 802.1X authentication and do I need it for Security+?

A

802.1X is a port-based network access control protocol. It requires devices to authenticate (e.g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is WPA2? What is WPA3?

A

WPA2: Older wireless security standard using PSK (pre-shared key). Strong, but vulnerable to offline attacks.
WPA3: Newer standard. Uses SAE (Simultaneous Authentication of Equals) to block offline password cracking and improve public Wi-Fi safety.
WPA3 = better protection for modern devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is segmented Wi-Fi?

A

Yes—like when you see “Walmart Guest” and “Walmart Employee.” Segmentation means different user types are put on different virtual networks (VLANs) to isolate their traffic and limit cross-access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an FTP server?

A

An FTP server hosts files for upload or download using the File Transfer Protocol. Commonly used for website uploads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you close a port?

A

Disable the associated service on the system (e.g., stop the web server on port 80).
Use a firewall to block traffic to that port.
You can also configure systems to ignore unsolicited traffic on unused ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is the firewall attached to ports?

A

Yes—firewalls monitor traffic going to and from specific ports.
You can configure rules that say, for example: ‘Block all inbound traffic on port 23 (Telnet)’ or ‘Allow only internal traffic on port 443 (HTTPS)’.
So yes, firewalls are port-aware and port-controlling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a host (in networking)?

A

A host is any device that has an IP address and can send or receive network traffic. This includes servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does “hosting” mean?

A

Hosting means running a service or application on a device (the host) that other devices can access over a network. For example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a rogue access point?

A

A rogue AP is a wireless access point connected to a secure network without authorization. It can expose the internal network to anyone within range and is a major physical-layer vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an evil twin access point?

A

An evil twin is a fake wireless network with the same name (SSID) as a legitimate one. It tricks users into connecting

17
Q

What is a deauthentication (deauth) attack?

A

A deauth attack forcibly disconnects a user from a Wi-Fi network by sending fake “de-auth” frames. The goal is to force reconnection (possibly to an evil twin) or capture handshake data for password cracking.

18
Q

What is WPA2?

A

WPA2 (Wi-Fi Protected Access 2) is a common wireless security protocol that uses pre-shared keys (PSK). It provides strong encryption but is vulnerable to offline brute-force attacks if weak passwords are used.

19
Q

What is WPA3?

A

WPA3 is the newer wireless security protocol. It replaces PSK with SAE (Simultaneous Authentication of Equals)

20
Q

What is Wi-Fi segmentation?

A

Wi-Fi segmentation means splitting a wireless network into separate virtual networks (e.g.

21
Q

What is Bluetooth tracking?

A

Bluetooth devices constantly broadcast a unique ID. If that ID doesn’t change

22
Q

What is BlueBorne?

A

BlueBorne is a vulnerability that allowed attackers to take control of Bluetooth-enabled devices without pairing or user interaction. It exploited weaknesses in how Bluetooth handled connections.

23
Q

What does it mean when a host is “listening” on port 443?

A

It means the host is acting as a server.
It’s hosting a service (in this case, HTTPS web traffic) and is ready to accept connections from clients.
Listening = the service is “open for business” on that port.

24
Q

What’s the difference between a host and a server?

A

A host is any device on a network.
A server is a host that’s currently providing a service to other devices.
All servers are hosts, but not all hosts are servers.
Hosting = the act of serving something on the network.

25
Where do ports live and how do you open or close one?
Ports are virtual endpoints inside an operating system. They’re opened by services (like a web server) and controlled by firewalls. You close a port by stopping the service that’s using it or by creating a firewall rule to block traffic on that port.
26
What makes a server different from a regular computer?
A **server** is a computer optimized to provide services to other devices, especially over a network. Key differences: - No screen (controlled remotely) - Redundant hardware (for uptime) - Rack-mountable (for datacenters) - ECC RAM (error correction) - Built for 24/7 operation It’s not magic — just a purpose-built machine designed to host services reliably.
27
What does “the cloud” actually mean?
It means using **someone else’s servers** over the internet. Instead of running your own hardware locally, you rent server space (compute power, storage, etc.) from a provider like AWS, Azure, or Google Cloud. The cloud = not local. You're still using servers — just not ones you own.