4.1 Flashcards

Secure baselines, hardening targets, securing wireless and mobile, wireless security settings, application security

1
Q

A template of a secure configuration that can be modified in order to best serve the specific application it is being used for.

They are often available from the manufacturer of the device or application.

A

Security baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True/False

Most security baselines rarely need updating/changing

A

True

However, some baselines may require frequent updating due to discovered vulnerabilities or new software needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 common hardening techniques for mobile devices

A

Update

Segmentation (user vs company data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True/False

Mobile devices typically have hardening checklists available from the manufacturer

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4 ways to harden a workstation

A

Keep it updated

Automate the monthly security patches (but make sure to test them)

Connect to a policy management system (AD group policy, etc.)

Remove unnecessary software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2 ways to harden network infrastructure devices

A

Configure authentication - don’t use defaults!

Check with the manufacturer for security updates

(Because these are purpose-built devices, they don’t get updated often. But any updates are always important.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4 ways to harden/secure cloud infrastructure

A

Secure the cloud management workstation

Implement least privilege

Configure EDR (all devices accessing the cloud should be secure)

Always have backups (you can backup to a separate cloud provider)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

4 ways to harden/secure servers

A

Update and patch

Secure accounts (least privilege, password requirements)

Limit network access (firewall)

Monitor and secure (antivirus, antimalware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SCADA stands for

A

Supervisory Control and Data Acquisition System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1 way to harden/secure SCADA/ICS

A

Extensive segmentation - no access from the outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 ways to harden/secure embedded systems

A

Security patches

Segmentation on their own network

Firewall in front of the segment

Note: Upgrading/modifying an existing embedded system is not always an option. Remember that embedded systems don’t usually allow access into the OS. Things like televisions and watches are easy, but other things not so much.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 ways to harden/secure RTOSs

A

Isolate the system from the rest of the network

Run with the minimum amount of services

Use secure communication (firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 ways to harden/secure IoT devices

A

Change default accounts and configurations

Deploy updates quickly

Segment IoT devices on their own VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The inspection of a location that involves what wireless networks are nearby, determining the existing wireless spectrum, identifying existing access points, and a plan for how to work around existing wireless frequencies.

A

Site survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A two-dimensional diagram that shows wireless AP signal coverage.

A

Heat map

AKA Wi-Fi coverage map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MDM stands for

A

Mobile Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

BYOD stands for

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A system that allows centralized management of mobile devices. Can set policies on features (camera, apps, data, etc.), enforce segmentation, and manage access control (screen locks, PINs).

A

MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A policy that allows employees to bring their own personal device to be used partially for work. The device will be managed via an MDM.

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

COPE stands for

A

Corporate owned, personally enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A policy where the organization purchases the device for employees to use as both a personal and corporate device.

A

COPE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Difference between COPE and CYOD

A

CYOD allows the employee to choose which device they want to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CYOD stands for

A

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PAN stands for

A

Personal Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PAN is AKA

A

Bluetooth

25
Q

MIC stands for

A

Message Integrity Check

26
Q

3 methods to secure a wireless network

A

Authenticate users before granting access

Encrypt all confidential communication

Verify integrity of communication (MIC)

27
Q

True/False

WPA2 is insecure because it is vulnerable to brute force attacks

A

True

28
Q

Which cipher mode does WPA3 use? This encryption is stronger than that of WPA2.

A

GCMP

29
Q

GCMP stands for

A

Galois/Counter Mode Protocol

30
Q

2 security services that GCMP provides

A

Data confidentiality with AES

MIC with GMAC (Galois Message Authentication Code)

31
Q

SAE stands for

A

Simultaneous Authentication of Equals

32
Q

The authentication process used in WPA3

A

SAE

33
Q

A derivation of Diffie-Hellman key exchange with an authentication component. Everyone uses a different session key even if they each use the same pre-shared key.

Eliminates the need for four-way handshakes and hashes, so it is not vulnerable to brute force attacks.

A

SAE

34
Q

SAE is AKA

A

Dragonfly handshake

35
Q

A PSK is a fancy name for a…

A

Network password

36
Q

PSK stands for

A

Pre-shared key

37
Q

The 2 most common methods of securing a network

A

Shared password (PSK)

Centralized authentication (802.1X)

38
Q

WPA3-Personal / WPA3-PSK provides authentication via

A

PSK

39
Q

WPA3-Enterprise / WPA3-802.1X provides authentication via

A

Individual authentication credentials with an authentication server (ex. RADIUS, LDAP, TACACS+, etc.)

40
Q

A framework that identifies users, authenticates them, identifies their permissions, and logs what resources that user accessed.

A

AAA framework

41
Q

RADIUS stands for

A

Remote Authentication Dial-In User Service

42
Q

One of the most common AAA protocols that is supported on a wide variety of platforms and devices.

It centralizes authentication for users–through routers, switches, firewalls, VPNs, and 802.1X network access.

A

RADIUS

43
Q

When a network says it is an “open system” that means…

A

No authentication/password is required

44
Q

NAC stands for

A

Network Access Control

45
Q

A control that prevents network access until authentication is successful (802.1X is just one type of this)

A

NAC

46
Q

802.1X NAC is used in conjunction with…

A

AAA server (RADIUS, LDAP, TACACS+, etc.)

Allows administrators centralized management for disabling accounts, forcing password changes, etc.

47
Q

A framework used with 802.1X that allows manufacturers to customize authentication measures for their devices to meet requirements.

Combined with 802.1X to provide authentication to the network.

A

EAP

48
Q

EAP stands for

A

Extensible Authentication Protocol

49
Q

A security process that prevents unexpected input from being interpreted by an application

A

Input validation

50
Q

A type of input validation that raises an error when the input does not match what is expected. (ex. SSN should be 9 characters and only have integers.)

A

Normalization

51
Q

An automated tool that inputs random data of random types to see what the application does. If the application behaves unexpectedly, the developer can fix whatever issue it has.

A

Fuzzer

52
Q

Small pieces of information that are stored on your browser that track the websites you visited. They are used for personalization and session management.

A

Cookies

53
Q

Difference between cookies and secure cookies

A

Secure cookies will only be transferred when using a secure connection (ex. HTTPS)

54
Q

SAST stands for

A

Static Application Security Testing

55
Q

An automated analysis tool that identifies known vulnerabilities (buffer overflows, database injections, etc.)

A

SAST

56
Q

A way to ensure that the code you are installing is the same code that was deployed by the developer/manufacturer

A

Code signing

57
Q

A method of isolating a system for the purposes of testing data without affecting the production network.

A

Sandbox

58
Q

Real-time detection of application use that can indicate who is accessing the application, blocked attack attempts, identify anomalous file transfers or increased permissions, and log events.

A

Application security monitoring

59
Q

2 vulnerabilities that CANNOT be identified by a SAST tool.

A

Authentication security
Insecure cryptography