1.2 Threat Management Flashcards
what is lightweight extensible authentication protocol (LEAP)?
a proprietary wireless LAN authentication method developed by Cisco Systems
which type of analysis involves identifying traffic that is abnormal?
anomaly analysis
which wireless protocol provides the best security: WEP, WAP, WPA, or WPA2?
WPA2 with CCMP
which category of IDS might increase logging activities, disable a service, or close a port as a response to a detected security breach?
active detection
what does the acronym SIEM denote?
security information and event management
what should you do to ensure that a wireless access point signal does not extend beyond it needed range?
reduce the power levels
which type of analysis involves examining information in the header of the packet?
protocol analysis
what is the purpose of MAC filtering?
to restrict the clients that can access a wireless network
what is protected extensible authentication protocol (PEAP)?
a protocol that encapsulates the EAP within an encrypted and authenticated TLS tunnel
what are the two modes of WAP and WPA2?
personal (also called preshared key or WPA-PSK / WPA2-PSK) and enterprise
what type of analysis focuses on the long term direction in the increase or decrease in a particular type of traffic?
trend analysis
which security protocol is the standard encryption protocol for use with the WPA2 standard?
counter mode cipher block chaining message authentication code protocol (CCMP)
which security protocol was designed as an interim solution to replace WEP without requiring the replacement of legacy hardware?
temporal key integrity protocol (TKIP)
which intrusion detection system (IDS) watches for intrusions that match a known identity?
signature-based IDS
which software can collect logs from specified devices, combine the logs, and analyze the combined logs for security issues?
security information and event management (SIEM)