1.2 Threat Management Flashcards

1
Q

what is lightweight extensible authentication protocol (LEAP)?

A

a proprietary wireless LAN authentication method developed by Cisco Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

which type of analysis involves identifying traffic that is abnormal?

A

anomaly analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which wireless protocol provides the best security: WEP, WAP, WPA, or WPA2?

A

WPA2 with CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which category of IDS might increase logging activities, disable a service, or close a port as a response to a detected security breach?

A

active detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does the acronym SIEM denote?

A

security information and event management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what should you do to ensure that a wireless access point signal does not extend beyond it needed range?

A

reduce the power levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

which type of analysis involves examining information in the header of the packet?

A

protocol analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the purpose of MAC filtering?

A

to restrict the clients that can access a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is protected extensible authentication protocol (PEAP)?

A

a protocol that encapsulates the EAP within an encrypted and authenticated TLS tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what are the two modes of WAP and WPA2?

A

personal (also called preshared key or WPA-PSK / WPA2-PSK) and enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what type of analysis focuses on the long term direction in the increase or decrease in a particular type of traffic?

A

trend analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

which security protocol is the standard encryption protocol for use with the WPA2 standard?

A

counter mode cipher block chaining message authentication code protocol (CCMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which security protocol was designed as an interim solution to replace WEP without requiring the replacement of legacy hardware?

A

temporal key integrity protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which intrusion detection system (IDS) watches for intrusions that match a known identity?

A

signature-based IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which software can collect logs from specified devices, combine the logs, and analyze the combined logs for security issues?

A

security information and event management (SIEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what doe heuristic analysis do?

A

it determines the susceptibility of a system towards a particular threat/risk using decision rules or weighing methods

17
Q

which protocol does the enterprise mode of WPA and WPA2 use for authentication?

A

extensible authentication protocol (EAP)

18
Q

which wireless mode ensures that wireless clients can only communicate with the wireless access point and not with other wireless clients?

A

isolation mode

19
Q

which type of IDS or IPS uses an initial database of known attack types but dynamically alters their signatures base on learned behavior?

A

heuristic

20
Q

what doe packet analysis do?

A

it examines the entire packet, including the payload

21
Q

what are the non-overlapping channels for 802.11g/n?

A

channels 1,6, and 11

22
Q

what are the non-overlapping channels for 802.11b?

A

channels 1,6,11, and 14