Sec + Flashcards

Study for the Sec+ certification (35 cards)

1
Q

Wi-Fi Protected Setup

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPS

A

Wi-Fi Protected Setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PIN recovery

A

Wi-Fi Protected Setup (WPS) exploit?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wi-Fi Protected Setup (WPS) exploit?

A

PIN recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPS PIN feature, which most recent models have enabled by ________

A

default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPS PIN feature

A

This flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network’s WPA/WPA2 pre-shared key.[2] Users have been urged to turn off the WPS PIN feature,[3] although this may not be possible on some router models.[4]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________ a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. It may be used by attackers to bypass access controls such as the same-origin policy.

A

Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for __________.

A

IP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Radio-frequency identification (______) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically-stored information. Passive tags collect energy from a nearby ______ reader’s interrogating radio waves.

A

RFID

RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RFID

A

Radio-frequency identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wi-Fi Protected Setup

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WPS

A

Wi-Fi Protected Setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

contents of a rainbow table entry

A

Hash/Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EOL

A

End of Life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

POODLE (Padding Oracle on Downgraded Legacy Encryption)

A

cryptographic downgrade attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

three authentication protocols that offer countermeasures against replay attacks?

A

IPsec
Kerberos
CHAP

17
Q
Which of the following cryptographic hash functions is the least vulnerable to attacks?
   SHA-1
   RIPEMD	
   SHA-512	
   MD5
18
Q

Active reconnaissance techniques

A

port scanning….. (add to later)

19
Q

Applies to a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports? IEEE 802.___?

20
Q

forward proxy

A

Acts on behalf of a client

Hides the identity of a client

21
Q

reverse proxy

A

Acts on behalf of a server

Hides the identity of a server

22
Q

A common example of channel overlapping in wireless networking could be the 2.4 GHz band used in 802.11 networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (_____________) allows multiple networks to coexist in the same area without causing interference.

A

1, 6, and 11 in this case

23
Q

The underlying principles of every ________ system is to aggregate relevant data from multiple sources, identify deviations from the norm and take appropriate action. For example, when a potential issue is detected, a _________ might log additional information, generate an alert and instruct other security controls to stop an activity’s progress.

24
Q

Write once read many (__________) describes a data storage device in which information, once written, cannot be modified.

25
Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can ____________.
transfer
26
Data loss prevention
(DLP)
27
(DLP)
Data loss prevention (DLP)
28
TLS is a cryptographic protocol that provides end-to-end communications security
Transport Level Security
29
The Rogue AP Detection page displays information about all access points detected by the AP541N in the vicinity of the _________.
network
30
Rogue AP Detection page
displays information about all access points detected by the AP541N in the vicinity of the network.
31
Which are two that refer to the implementations of NAC?
MAC filter | 802.1X
32
DLP
Data loss prevention software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in-use, in-motion, and at-rest.
33
Transport Layer Security, and its now-deprecated predecessor, Secure Sockets Layer, are _____ ________ designed to provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, instant messaging, and voice over IP.
cryptographic protocols
34
TLS
Transport Layer Security
35
SSL
Secure Sockets Layer