Ch 4. Securing Your Network Flashcards

1
Q

HIDS

A

host based intrusion detection system; software installed on a system to detect attacks. It protects local resources on the host. A HIPS is an extension of HIDS and detects and blocks attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIDS

A

network based intrusion detection system; a device that detects attacks and raises alerts. A NIDS is installed on network devices, such as routers or firewalls. and monitors network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Port Mirror

A

a monitoring port on a switch. All traffic going through the switch is also sent to the port mirror.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Taps

A

monitoring ports on a network device. IDSs use taps to capture traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Signature Based Detection

A

a type of monitoring used on intrusion detection and intrusion prevention systems that detects attacks based on known attack patterns documented as attack signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Heuristic/Behavioral/Anomaly Based Detection

A

a type of monitoring that can detect unknown anomalies. They start with a performance baseline of normal behavior and then compare network traffic against this baseline. When traffic differs significantly from the baseline, the IDS sends an alert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

inline

A

an IPS is inline with traffic. All traffic passes through the IPS and the IPS can block malicious traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

out-of-band

A

an IDS is out-of-band. It monitors the network traffic, but the traffic doesn’t go through the IDS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RAT

A

Remote Access Trojan; malware that allows an attacker to take control of a system from a remote location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL/TLS Accelerator

A

device used to handle TLS traffic. Severs can off-load TLS traffic to improve performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSL Decryptor

A

device used to create separate SSL (or TLS) sessions. They allow other security devices to examine encrypted traffic sent to and from the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SDN

A

software defined network; a method of using software and virtualization technologies to replace hardware routers. SDNs separate the data and control planes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Honeypot

A

a server that’s left open or appears to have been sloppily locked down, allowing an attacker relatively easy access. Diverts the attacker away from the live network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IEEE 802.1x

A

a server that provides port-based authentication, ensuring that only authorized clients can connect to a network. It prevents rogue devices from connecting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AP

A

access point; a device that connects wireless clients to wireless networks. Sometimes called a wireless access point (WAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fat AP

A

includes everything needed to connect wireless clients to a wireless network. Typically includes features such as a routing component, NAT, DHCP, ACLs, etc. Must be configured separately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Thin AP

A

managed by a wireless controller who configures the AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SSID

A

service set identifier; the name of a wireless network. SSIDs can be set to broadcast so users can easily see it. Disabling it hides it from casual users

19
Q

WPA/WPA2

A

Wi-Fi Protected Access; a wireless security protocol. Supports CCMP for encryption, which is based on AES.

20
Q

PSK

A

Pre-shared Key; a wireless mode that uses a pre-shared key for security.

21
Q

Enterprise

A

a wireless mode that uses an 802.1x server for security. It forces users to authenticate with a username and password

22
Q

Captive Portal

A

a technical solution that forces clients using web browsers to complete a specific process before it allows them access to a network

23
Q

Disassociation Attack

A

removes a wireless client from a wireless network; a disassociation frame is sent to the AP to terminate the connection, the client must then reauthenticate

24
Q

WPS Attack

A

discovers the eight-digit WPS pin and uses it to discover the AP passphrase

25
Q

Rogue AP

A

an AP places within a network without official authorization

26
Q

Evil Twin

A

a rogue AP with the same SSID as a legitimate AP.

27
Q

Jamming

A

the transmission of noise or another radio signal on the same frequency used by a wireless network

28
Q

IV Attack

A

a wireless attack that attempts to discover the initialization vector

29
Q

NFC Attack

A

an attacker uses an NFC reader to capture data from another NFC device. Near Field Communication is a group of standards used on mobile devices that allow them to communicate with other mobile devices when they are close

30
Q

Bluejacking

A

the practice of sending unsolicited messages to nearby Bluetooth devices

31
Q

Bluesnarfing

A

refers to the unauthorized access to, or then of information from, a Bluetooth device.

32
Q

Replay Attack

A

an attacker captures data sent between two entities, modifies it, and then attempts to impersonate one of the parties by replaying the data

33
Q

Split Tunnel

A

a VPN administrator determines what traffic should use the encrypted tunnel

34
Q

Full Tunnel

A

all traffic goes through the encrypted tunnel while the user is connected to the VPN

35
Q

NAC

A

Network Access Control; provide continuous security monitoring by inspecting computers and preventing them from accessing the network if they don’t pass the inspection

36
Q

Permanent Agent

A

is installed on the client and stays on the client

37
Q

Dissolvable Agent

A

downloaded and run on the client when the client logs on remotely

38
Q

PAP

A

Password Authentication Protocol; used with Point-to-Point (PPP) to authenticate clients. A weakness is that it sends passwords over a network in cleartext

39
Q

CHAP

A

Challenge Handshake Authentication Protocol; uses PPP and authenticates remote users because it does not send passwords with cleartext

40
Q

MS-CHAPv2

A

Microsoft CHAP; performs mutual authentication, the client authenticates the server and the server authenticates the client

41
Q

RADIUS

A

Remote Authentication Dial-In User Service; a centralized authentication service

42
Q

TACACS+

A

the CISCO alternative to RADIUS; it encrypts the entire authentication process and uses multiple challenges and responses between the client and the sever

43
Q

Diameter

A

an extension of RADIUS that supports many additional capabilities, including securing transmission with EAP