1.5 Flashcards

1
Q

What is EAP-TLS?

A

EAP over TLS. Also available as EAP-TTLS, a tunneled version.

Strong security, widely adopted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between WPA2-Personal and WPA2-Enterprise?

A

Personal uses a pre-shared key; everyone uses the same key.

Enterprise authenticates uses an 802.1X authentication server, such as RADIUS. Everyone has their own credentials which can be changed or revoked individually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a logic bomb, and how should they be dealt with?

A

A type of malware that is set to take harmful effect under certain conditions, such as a specified time or event.

Because each is unique and has no predefined signature, they are best prevented by formal change control and automated change alerting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is 802.1X?

A

IEEE 802.1X is the most common standard of Network Access Control.

A form of port-based access control (physical ports, not TCP/UDP ports). Requires authentication before allowing access to any interface on the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Wardriving?

A

Collecting information about area networks while driving / travelling, by using a WiFi monitor and GPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a “deauthentication” attack?

A

An DOS attack that causes a device to disconnect from a resource, typically a wireless network, and prevents it from reconnecting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is VLAN hopping?

A

Connecting to a VLAN other than the one you’re on.

Two primary methods:
• Switch spoofing
• Double tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Double Tagging?

A

A form of VLAN hopping.

  • The device sends traffic with multiple VLAN tags, to get through multiple switches. The first switch removes the first tag, but sends it to the next switch with the second tag.
  • The communication is only one way, so no responses will be received back.
  • Useful for a DOS.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Switch Spoofing?

A

A form of VLAN hopping.

  • Some switches support auto-configuration to determine if a port is connected to a device or a trunk.
  • A device can take advantage of this by pretending to be a trunk link (a switch), which allows TX and RX with any VLAN.
  • This can be prevented by disabling automatic trunk negotiation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ARP Poisoning?

A

Sending out ARP data that tells target systems that you have the MAC address which actually belongs to another device.

Used for Man-in-the-Middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly