1.3 Flashcards

1
Q

BYOD device variety also causes security issues, especially in terms of unpatched devices. Another issue is that the device is not fully under the administrative control of the IT department. An insider _______________ could install apps that might risk school data or misuse the device to exfiltrate data.

A

threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______________ refer to the ability of a network device to transmit or receive at the same time or not. Half-duplex means only one can happen at a time, while Full-duplex means send/receive can happen simultaneously. If not configured properly, collisions can occur.

A

Duplex settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_________________ is also used in most denial of service (DoS) attacks to mask the attack’s origin and make it harder for the target system to block packets from the attacking system. In this type of spoofing, the threat actor does not care about not receiving return traffic.

A

IP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______________ is the time that passes as the link is either up or down. You may also want to track the uptime or downtime percentage so that you can assess a link’s reliability over time.

A

Uptime/downtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

________________ is beneficial in cases where multiple private IP addresses are being mapped onto a single public address.

A

Port Address Translation (PAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The first step is for the client to send a segment with the TCP flag SYN set to the server with a __________________ . The client enters the SYN-SENT state.

A

randomly generated sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An email administrator is setting up records for their new cluster of mail servers. What must each of their MX records point to?

The host identified in an ____________ record must have an associated A or AAAA record.

A

MX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An _______________ is when a threat actor stands up another access point (AP) that spoofs the legitimate AP. When users try to manually reconnect, the fake AP will be able to harvest users’ authentication information.

A

evil twin attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An _______________ is when a threat actor stands up another access point (AP) that spoofs the legitimate AP. When users try to manually reconnect, the fake AP will be able to harvest users’ authentication information.

A

evil twin attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This evil twin may also act as a ___________ if connected to legitimate local area network (LAN). This AP can then snoop on incoming connections to other servers and websites on the LAN.

A

rogue AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly