1.0 Network Security Flashcards

1
Q

What does security mean?

A

Security is the degree of protection against danger, damage, loss, and criminal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does CIAN stand for?

A

CIAN stands for Confidentiality Integrity Availability Non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the steps of an attack?

A

Then steps of an attack generally include Reconnaissance, Breach, Escalate privilages, Stage, Exploit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What defense methodology is Layering?

A

Layering involves implementing multiple security measures to protect the same asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What defense methodology is the principle of least privilege?

A

The principle of least privilege states that users or groups are given only the access they need to do their job and nothing more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does access control mean?

A

Access control is the ability to permit or deny privileges that users have when accessing resources on a network or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What processes are included in access control?

A

Some processes that are included in access control are Identification, Authentication, Authorization, and Auditing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the MAC access control model?

A

The MAC access control model is Mandatory Access Control which uses authorization policies to determine if a resource can be accessed by a specific user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the DAC access control model?

A

The DAC access control model is Discretionary Access Control which assigns access directly to users based on the discretion of the owner of the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the RBAC access control model?

A

The RBAC access control model is Role-Based Access Control where access is allowed based on the role of the user in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does authorization mean?

A

Authorization is the process of controlling access to resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Access Control List?

A

An Access Control List identifies users or groups who have specific security assignments to an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a DACL type of access list?

A

A DACL access list is a Discretionary Access Control List which is the implementation of Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a SACL type of access list?

A

A SACL access list is a System Access Control List which is used by Microsoft for auditing to identify past actions performed by users on an object.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Effective Permissions?

A

Effective permissions are the combined inherited permissions and explicit permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define ‘Need to know’.

A

Need to know describes the restriction of data that is highly sensitive and is usually referenced in government and military context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define ‘Separation of duty”.

A

Separation of duty is the concept of having more than one person required to complete a task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define ‘Job rotation’.

A

Job rotation is a technique where users are cross-trained in multiple job positions, and where responsibilities are regularly rotated between personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define ‘Defense-in-depth’.

A

Defense-in-depth is an access control method which implements multiple access control methods instead of relying on a single method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is creeping privileges?

A

Creeping privileges occurs when a user’s job position is changed and they are granted a new set of access privileges and their previous access privileges are not removed or modified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the four stages in the remote access process?

A

The four stages in the remote access process are Connection, Authentication, Authorization, and Accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Explain RADIUS.

A

Remote Authentication Dial-In User Service is used to centralize remote access administration. A RADIUS server combined authentication, authorization, and accounting and can use PPP, CHAP, and PAP. RADIUS uses UDP port 1812 and 1813.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Explain TACACS+

A

Terminal Access Controller Access-Control System Plus is used to centralize remote access administration. TACACS+ provides authentication, authorization, and accounting with the ability to host each service on separate servers. TACACS+ uses TCP port 49.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Telephony?

A

Telephony is the transmission of voice communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is ‘convergence’?

A

Convergence refers to the intermingling of voice and data services on networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the layers of the OSI model?

A
Layer 7: Application
Layer 6: Presentation
Layer 5: Session
Layer 4: Transport
Layer 3: Network
Layer 2: Data Link
Layer 1: Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are two types of Reconnaissance?

A

Organization (conducting research about a company to find information and create a profile about the organization) and Technical (using electronic means to scan systems to collect configuration and security data).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the difference between passive reconnaissance and active scanning?

A

Passive reconnaissance is characterized by gathering data while active scanning is coming into contact with the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a ping flood?

A

A ping flood is a simple DoS attack where the attacker overwhelms the victim with ICMP Echo Request packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the ping of death?

A

The ping of death is a DoS attack that uses the ping program to send oversized ICMP packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a smurf attack?

A

A smurf attack is a form or DRDoS attack that spoofs the source address in ICMP packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a SYN flood attack?

A

A SYN flood attack exploits the TCP three-way handshake by not sending the last message that would close the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a LAND attack?

A

A LAND attack is one in which the attacker floods the victim’s system with packets that have forged headers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a Christmas Tree attack?

A

A Christmas tree attack uses an IP packet with every option turned on for the protocol being used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a bastion host?

A

A bastion or sacrificial host is any host that is exposed to attack and that has been hardened against those attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a demilitarized zone?

A

A demilitarized zone or DMZ is a buffer network that sits between the private network and an untrusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a screening router?

A

A screening router is the router that is most external to your network and closest to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a duel-homed gateway?

A

A dual-homed gateway is a firewall device that typically has three network interfaces: one connected to the internet, one connected to a private network, and one connected to a public network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is a screened host gateway?

A

A screened host gateway resides within the DMZ, requiring users to authenticate in order to access resources within the DMZ or the intranet.

40
Q

What is the difference between a network-based firewall and a host-based firewall?

A

A host-based firewall inspects the traffic when it is received by a host while a network-based firewall inspects the traffic while it comes into the network.

41
Q

What is a packet filtering firewall?

A

A packet filtering firewall makes decisions about which traffic to allow by examining information in the IP packet header.

42
Q

What is a stateful firewall?

A

A stateful firewall makes decisions about which traffic to allow based on virtual circuits or sessions.

43
Q

What is an application firewall?

A

An application firewall makes security decisions based on information contained within the data portion of a packet.

44
Q

What is a NAT router?

A

A Network Address Translation (NAT) router translates multiple private addresses the single registered IP address.

45
Q

What is a VPN?

A

A Virtual Private Network (VPN) is a remote access connection that uses encryption to securely send data over an untrusted network.

46
Q

Explain what PPTP is.

A

Point-to-Point Tunneling Protocol (PPTP) was one of the first VPN protocols. It uses CHAP or PAP for authentication and MPPE for encryption. PPTP uses TCP port 1723.

47
Q

Explain what L2TP is.

A

Layer 2 Tunneling Protocol (L2TP) is an open standard for securing multi-protocol routing. It operates at the data-link layer and uses IPSec for encryption. L2TP uses TCP port 1701 and UDP port 500.

48
Q

Explain what IPSec is.

A

Internet Protocol Security provides authentication and encryption and can be used in conjunction with L2TP or by itself as a VPN solution. IPSec uses Authentication Header (AH) for authentication and Encapsulating Security Payload (ESP) for encryption.

49
Q

Explain what SSL is.

A

Secure Sockets Layer (SSL) is a protocol that has long been used to secure traffic generated by other IP protocols. SSL encrypts the entire communication session and uses port 443.

50
Q

What is NAP?

A

Network Access Protection (NAP) is a collection of components that allow administrators to regulate network access or communication based on a computer’s compliance with health requirement policies.

51
Q

What is a NAP client and a NAP server?

A

A NAP client is a computer that has NAP-aware software while a NAP server is responsible for keeping track of health requirements and verifying that clients meet those requirements.

52
Q

What is an enforcement server?

A

An enforcement server is the connection point for clients to the network.

53
Q

What are remediation servers?

A

Remediation servers are a set of resources that non-compliant computers can access on the limited-access network.

54
Q

What is a DHCP enforcement server?

A

The DHCP enforcement server controls access by leasing addresses only to computers that meet the health requirements.

55
Q

What is a Remote Desktop Gateway server?

A

A Remote Desktop Gateway server can be combined with NAP to allow or deny access based on health compliance.

56
Q

What is WEP?

A

Wired Equivalent Privacy (WEP) is an optional component of the 802.11 specification and is available in 64-bit and 128-bit implementations. WEP uses RC4 with a 40-bit key for encryption and CRC-32 for data integrity.

57
Q

What is WPA?

A

Wi-Fi Protected Access (WPA) is the implementation name for wireless security besed on initial 802.11i drafts and uses TKIP for encryption. WPA provides dynamic keys and dynamic key rotation.

58
Q

What is WPA2?

A

Wi-Fi Protected Access 2 (WPA2) or 802.11i usesCBC-MAC for data integrity and AES with either TKIP or CCMP for encryption. WPA2 supports dynamic key generation and rotation through CCMP.

59
Q

What is a rouge access point?

A

A rouge access point is any unauthorized access point added to a network.

60
Q

What is the difference between wardriving and warchalking?

A

Wardriving involves an attacker scanning an area looking for available wireless networks where warchalking involves drawing symbols in public places to advertise the existence and status or wireless networks.

61
Q

What is EAP?

A

Extensible Authentication Protocol (EAP) is a set of interface standards that allows you to use various authentication methods.

62
Q

What is LEAP?

A

Light-weight Extensible Authentication Protocol (LEAP) is considered to be the weakest 802.1x protocol. It does not use SSL/TLS to encapsulate authentication data.

63
Q

What is PEAP?

A

Protected Extensible Authentication Protocol (PEAP) provides authentication in an SSL/TLS tunnel with a sungle certificate on the server.

64
Q

What is MAC flooding?

A

MAC flooding overloads the switch’s MAC forwarding table to make the switch function like a hub.

65
Q

What is ARP spoofing/poisoning?

A

ARP spoofing/poisoning associates the attacker’s MAC address with the IP address of victim devices.

66
Q

What is MAC spoofing?

A

MAC spoofing is changing the source MAC address on frames sent by the attacker.

67
Q

What is DTP?

A

Dynamic Trunking Protocol (DTP) is where switches have the ability to automatically detect ports that are trunk ports and to negotiate the trunking protocol used between devices.

68
Q

What is a VLAN?

A

A Virtual LAN (VLAN) is a logical grouping of computers based on switch ports.

69
Q

What is MAC filtering/port security?

A

With switch port security, the devices that can connect to a switch through the port are restricted by MAC address.

70
Q

What is port authentication?

A

Port authentication is provided by the 802.1x protocol, and allows only authenticated devices to connect to the LAN through the switch.

71
Q

What is FTP?

A

File Transfer Protocol (FTP) uses IPSec or a VPN tunnel to transfer data. It uses port 20 for data transfer and 21 for logons.

72
Q

What is TFTP?

A

Trivial File Transfer Protocol (TFTP) provides no authentication, encryption or error detection to transfer files.

73
Q

What is SCP?

A

Secure Copy Protocol (SCP) uses SSH to secure file transfers and logon credentials.

74
Q

What is SFTP?

A

Secure Shell File Transfer Protocol (SFTP) is a file transfer protocol that uses SSH to secure data transfers. SFTP is not FTP that uses SSH but rather a secure transfer protocol that is separate from FTP.

75
Q

What is Secure FTP?

A

Secure FTP tunnels FTP traffic through an SSH tunnel.

76
Q

What is FTPS?

A

FTP Secure (FTPS) is FTP that uses SSL to secure logon credentials and encrypt data transfers.

77
Q

What is Virtualization?

A

Virtualization is the ability to install and run multiple operating systems concurrently on a single physical machine.

78
Q

What is included in virtualization?

A

Typically, components of virtualization are a physical machine, a virtual machine, a virtual hard disk, and a hypervisor.

79
Q

What is a ‘hot site’?

A

A hot site is a redundant facility that is immediately available, requiring only a few minutes to hours to activate.

80
Q

What is a ‘warm site’?

A

A warm site is a partially configured redundant facility that takes a few days to a few weeks to activate.

81
Q

What is a ‘cold site’?

A

A cold site takes a few weeks to a few months to activate.

82
Q

What is clustering?

A

Clustering is the connection of a group if independent computers to increase the availability to applications and services.

83
Q

What is a high availability cluster?

A

A high availability cluster is a group of computers that are configured with the same service.

84
Q

What is a load balancing cluster?

A

A load balancing cluster disperses a workload between two or more computers or resources to achieve optimal resource utilization, throughput or response time.

85
Q

What is SSL?

A

Secure Sockets Layer (SSL) secures messages being transmitted on the internet. It uses RSA or KEA for secure exchange of encryption keys and uses port 443.

86
Q

What is TLS?

A

Transport Layer Security (TLS) is the successor to SSL 3.0. TLS uses Diffie-Hellman or RSA to exchange session keys.

87
Q

What is SSH?

A

Secure Shell (SSH) allows for secure interactive control of remote systems.

88
Q

What is Authentication Header?

A

Authentication Header (AH) provides authenticity, non-repundiation, and integrity.

89
Q

What is ESP?

A

Encapsulating Security Payload (ESP) provides all security of AH plus confidentiality.

90
Q

What is a public cloud?

A

A public cloud can be accessed by anyone.

91
Q

What is a private cloud?

A

A private cloud provides resources to a single organization.

92
Q

What is a community cloud?

A

A community cloud is designed to be shared by several organizations.

93
Q

What is a hybrid cloud?

A

A hybrid cloud is composed of a combination of public, private, and community cloud resources from different service providers.

94
Q

What is IaaS?

A

Infrastructure as a Service (IaaS) delivers infrastructures to the client, such as processing, storage, networks, and virtualized environments.

95
Q

What is PaaS?

A

Platform as a Service (PaaS) delivers everything a developer needs to build an application.

96
Q

What is SaaS?

A

Software as a Service (SaaS) delivers software applications to the client either over the Internet or on a local area network.

97
Q

What is a protocol analyzer?

A

A protocol analyzer is hardware or software for monitoring and analyzing digital traffic over a network.