Section 16 Securing Networks Flashcards

(26 cards)

1
Q

A user or administrator level account that is installed on a device by the manufacturer during production.

A

Default Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Copper, fiber optic, and coaxial cabling used as the connectivity method in a wired network.

A

Network Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A disturbance that can affect electrical circuits, devices, and cables due to radiation or electromagnetic.

A

Electromagnetic Interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A disturbance that can effect electrical circuits, devices, and cables due to AM/FM transmissions or cell towers.

A

Radio Frequency Interference (RFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Occurs when a signal transmitted on one copper wire creates an undesired effect on another wire.

A

Crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The electromagnetic field generated by a network cable or device when transmitting.

A

Data Emanation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secured system of cable management to ensure that the wired network remains free from eavesdropping, tapping, data emanations, and other threats.

A

Protected Distribution System (PDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uniquely identifies the network and is the name of the WAP used by the clients.

A

Service Set Identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An unauthorized WAP or Wireless Router that allows access to the secure network.

A

Rouge Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A rouge, counterfeit, and unauthorized WAP with the same SSID as your valid one.

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Same encryption key is used by the access point and the client.

A

Pre-Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Original 802.11 wireless security standard that claims to be as secure as a wired network.

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Replacement for WEP which sues TKIP, Message Integrity Check (MIC), and RC4 encryption.

A

WiFi Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

802.11; standard to provide better wireless security featuring AES with a 128 bit key, CCMP, and integrity checking.

A

WiFi Protected Access Version 2 (WPA 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Automated encryption setup for wireless networks at a push of a button, but is severely flawed and vulnerable.

A

WiFi Protected Setup (WPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intentional radio frequency interference targeting your wireless network to cause a denial of service condition.

17
Q

Creates network segment for each client when it connects to prevent them from communicating with other clients on the network.

18
Q

Act of searching for wireless networks by driving around until you find them.

19
Q

Act of physically drawing symbols in public places to denote the open, closed, and protected networks in range.

20
Q

Attack that targets an individual client connected to a network, forces it offline by deauthenticating it, and then captures the handshake when it reconnects.

A

WiFi Disassociation Attack

21
Q

Occurs when an attacker continually guesses a password until the correct one is found.

A

Brute Force Attack

22
Q

Uses AES-256 encryption with a SHA-384 hash for integrity checking.

A

WPA3 - Enterprise Mode

23
Q

A secure password-based authentication and password authenticated key agreement method.

A

Simulations Authentication of Equals (SAE)

24
Q

A feature of key agreement protocols (like SAE) that provides assurance that session keys will onto be compromised even if long term secrets used in the session keys exchange are compromised.

A

Froward Secrecy

25
Devices that use a radio frequency signal to transmit identifying information about the device or token holder.
Radio Frequency Identification (RFID)
26
Allows two devices to transmit information when they are within close range through automated pairing and transmission.
Near Field Communication (NFC)