Supplemental Flashcards

(62 cards)

1
Q

when a client sends a request to a WAP, they are added to that devices ___

A

Associated List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the first step in giving 802.11 some security was ___, which uses the ___ encryption protocol

A

Wired Equivalency Privacy (WEP); RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WEP uses encryption keys ___, making it relatively easy to hack

A

that are generated by the WAP and shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the current standard for wireless encryption is ___, also known as ___

A

802.11I, WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11i/WPA2 uses ___ for authentication using a ___ server, and the ___ encryption protocol.

A

802.1x; RADIUS; AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

because much of the hardware couldn’t handle AES encryption when 802.11i was released, the ___ was developed and later named ___

A

Temporal Key Integrity Protocol (TKIP); Wireless Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TKIP/WPA improved the ___ of key generation and WPA2 uses AES encryption via ___

A

initialization vector; CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RADIUS solves the problem of ___, but not ___.

A

authentication; authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RADIUS servers refer to the internet gateway as the ___ and the user trying to authenticate as the ___

A

client; supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RADIUS servers can use any of the following ports:

A

UDP 1812, 1813, 1645, 1646

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Windows networks have two particular authentication protocols, one is ___ in which the client and server both send challenge messages, and the other is ___, in which the Domain Controller acts as a ___

A

NT LAN Manager; Kerberos; Key Distribution Center (KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the TKIP increased the key initialization vector from ___ bits to ___

A

24; 48

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UNIX systems use a ___ to protect their hashed password database

A

shadow password file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

in ___ a physical chip installed on a device holds passwords, keys and digital signatures for authentication

A

Trusted Platform Module (TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bitlocker is an example of built in ___

A

Whole Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the ___ files on a computer cannot be encrypted, making ___ on startup critical

A

boot process; authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___ hashing is commonly used in digital signatures

A

Message Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a ___ attack takes advantage of occasional hashing collisions

A

birthday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ hash algorithms were developed by the NSA and are used in PGP, TLS, SSL and IPsec because they are considered more secure than MD5

A

Secure Hash Algorithm (SHA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

unlike AES, DES or Blowfish, ___ is a streaming cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IPsec uses two modes, ___ and ___ mode

A

transport; tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___ is a secure form of Telnet

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

HTTPS is secured with ___

A

either SSL or TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

the easiest disaster recovery exercise is a ___

A

document review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
in a ___ attack, a piece of software is modified to carry malware
refactoring
26
___ allows devices to communicate over very short ranges using a chip implanted in the device
Near Field Communications (NFC)
27
rejecting a user that is actually authorized is a Type __ error
1
28
the main users of an Interconnection Service Agreement (ISA) are ___
telecommunications companies
29
SCP and SFTP use ___ for encryption (and Port 22) while FTPS uses ___ for encryption
SSH, SSL/TLS
30
the Linux command ___ shows all files and directories, and if used with the switch ___, will show ownership permissions for files
ls; -a
31
the Linux command ___ shows all network connections, routing tables and protocol statistics. To find out if your machine is functioning as a server, use the switch ___ and look to see if any of the connections say ___
netstat; -a; "listening" in the right-hand column
32
The Linux command Netstat can be used to see who your machine is talking to by shutting down all browsers and using the switch ___
-n
33
the Linux command ___ shows all the hops made by a packet to reach its destination. If you can't reach a website then use this to see if the failure is in the first few hops, meaning the failure is ___
tracert; in your network
34
the Linux command ___ will show all devices connected to your network and can be used to determine if a switch is being misused
arp
35
the AES encryption standard is also known as ___
Rijindael
36
the ___ encryption model uses Web of Trust and a public key
PGP
37
Risk Assessment looks at ___ and ___
Probability; Impact
38
when Diffie-Hellman uses an elliptical formula it is known as
ECDH
39
99.99% availability leaves ___ of down time per year
52 minutes
40
EAP-___ uses predetermined symmetric keys for authentication, EAP-___ is able to use TLS with both sides supplying a certificate and EAP-___uses TLS but only the server has a certificate
PSK; TLS; TTLS
41
the ___ authentication protocol is rarely used anymore because it passes the username and password as clear text
Password Authentication Protocol (PAP)
42
___ is the main Linux utility that is used to troubleshoot DNS issues
dig
43
___ encapsulates an EAP connection in an encrypted and authenticated tunnel
Protected EAP (PEAP)
44
Microsoft group policy complexity requirement means passwords contain characters from at least ___ different categories
3
45
___ is the usual method of valuing assets, which can be derived from the opinions of managers
asset classification
46
Containerization is virtualizing the ___
Operating System
47
the US Dept of Defense uses a Personal Identity Verification card called a ___
Common Access Control (CAC)
48
___ analysis looks at data, but does not identify trends or patterns
log
49
The ___ file on a local machine provides for fully qualified domain name (FQDN) resolution in the absence of DNS and can be used to redirect users to the wrong web site.
hosts
50
A ___ serves as a centralized authentication point for virtual private network connections.
VPN concentrator
51
A ___ attack is a type of ICMP attack where large amounts of ping packets are sent from a spoofed IP address on the network to the network broadcast address, causing many replies back to the victim and possibly bringing about a denial of service.
smurf
52
A ___ program opens a back door for the hacker to gain access to the system remotely at a later time
RAT
53
A ___ is a group of compromised systems that the hacker has control over and uses to attack a victim's system.
botnet
54
___ is the best choice for preventing cross-site scripting (XSS) attacks on websites
input validation
55
A ___ device responds by not doing anything to cause harm when the failure occurs. A ___ device responds by making sure the device is using a secure state when a failure occurs.
fail-safe; fail-secure
56
___ uses Microsoft Point-to-Point Encryption (MPPE) protocol to encrypt all traffic from the client to the server.
Microsoft CHAP (MS-CHAP)
57
___ indicates how long an asset may be down or offline without seriously impacting the organization.
The maximum tolerable downtime (MTD)
58
A minimum password age requires that users must wait a certain amount of time before ___
they are allowed to change passwords.
59
___ involves an attacker attempting to take control of or use a Bluetooth-enabled cell phone to place calls.
Bluebugging
60
IPSec provides encryption services for ___ when used in a VPN implementation.
L2TP
61
A ___ is a unique number assigned to each individual user account on a Windows system
security identifier (SID)
62
disaster recovery steps include preparation, ___, ___, ___, ___, reporting
Reporting, Detection, analysis, containment, and eradication