Sec + Flashcards
Study for the Sec+ certification (35 cards)
Wi-Fi Protected Setup
WPS
WPS
Wi-Fi Protected Setup
PIN recovery
Wi-Fi Protected Setup (WPS) exploit?
Wi-Fi Protected Setup (WPS) exploit?
PIN recovery
WPS PIN feature, which most recent models have enabled by ________
default
WPS PIN feature
This flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network’s WPA/WPA2 pre-shared key.[2] Users have been urged to turn off the WPS PIN feature,[3] although this may not be possible on some router models.[4]
_________ a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. It may be used by attackers to bypass access controls such as the same-origin policy.
Cross-site scripting
Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for __________.
IP packets
Radio-frequency identification (______) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically-stored information. Passive tags collect energy from a nearby ______ reader’s interrogating radio waves.
RFID
RFID
RFID
Radio-frequency identification
Wi-Fi Protected Setup
WPS
WPS
Wi-Fi Protected Setup
contents of a rainbow table entry
Hash/Password
EOL
End of Life
POODLE (Padding Oracle on Downgraded Legacy Encryption)
cryptographic downgrade attack
three authentication protocols that offer countermeasures against replay attacks?
IPsec
Kerberos
CHAP
Which of the following cryptographic hash functions is the least vulnerable to attacks? SHA-1 RIPEMD SHA-512 MD5
SHA-512
Active reconnaissance techniques
port scanning….. (add to later)
Applies to a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports? IEEE 802.___?
IEEE 802.1X
forward proxy
Acts on behalf of a client
Hides the identity of a client
reverse proxy
Acts on behalf of a server
Hides the identity of a server
A common example of channel overlapping in wireless networking could be the 2.4 GHz band used in 802.11 networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (_____________) allows multiple networks to coexist in the same area without causing interference.
1, 6, and 11 in this case
The underlying principles of every ________ system is to aggregate relevant data from multiple sources, identify deviations from the norm and take appropriate action. For example, when a potential issue is detected, a _________ might log additional information, generate an alert and instruct other security controls to stop an activity’s progress.
SIEM
SIEM
Write once read many (__________) describes a data storage device in which information, once written, cannot be modified.
WORM