Sec + 4 Flashcards

(20 cards)

1
Q

What is wpa3?

A

Wi-fi protected access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key protocol for wpa3? What encryption does it use?

A

Simultaneous authentication of equals (SAE).
Uses password-authenticated key exchange (PAKE) to derive keys from a password.
Uses different Hillman handshake called dragonfly to protect against brute force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is 802.1x?

A

Overarching access control standard for switches and ports. Need a certificate on the endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does eap-tls authentication protocol work?

A

Certificate on endpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does eap-ttls work?

A

2 stages.

  1. Sets up a secure server with certs
  2. Needs credential authentication from clients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is eap-fast?

A

Cisco product. Doesn’t use certs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is enumeration?

A

Assigning unique identifiers like asset tags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is sanitation?

A

Removing all data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is degaussing?

A

Strong magnets to erase storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is open vulnerabilities and assessment language (OVAL)?

A

Xml based schema to check security state and queue info related to vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the extensible configuration checklist descriptive format (xccdf)?

A

Xml schema to create and audit best practices, configs, and rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is static analysis?

A

Inspecting source code, binaries, and app artifacts without t running the code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is dynamic analysis?

A

Scanning at runtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do web app scanners do?

A

Dynamic and scan real world attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is tls?

A

Transport layer security.
Creates a secure and encrypted connection between clients and authentication server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ttls?

A

Uses eap to create a secure tunnels for authentication.

17
Q

What is eap?

A

Extensible authentication framework
Allows the use of multiple verification methods within the same protocol

18
Q

Primary advantage of CSR and third party CA?

A

Higher level of trust and industry recognition.

19
Q

What do managerial controls do?

A

Establish strategies, goals, and objectives for the overall security program.

20
Q

What is operation control?
Give an example.

A

Acceptable use policy. Procedures and responsibilities that are well defined and executed by people.