CH16 Securing Networks Flashcards

1
Q

What is a Privilege Escalation?

A

occurs when a user is able to gain the rights of another user or administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Vertical Privilege Escalation?

A

goes from a user to an admin account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Horizontal Privilege Escalation?

A

privilege escalation goes from one user to another user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Backdoor?

A

a way of bypassing normal authentication in a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the keys of having a good network security?

A

An IPS, proper firewall configs, network segmentation, and firmware updates are the keys to having network security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is EMI ?

A

EMI = Electromagnetic Interference

a disturbance that can affect electrical circuits, devices, and cables due to radiation or electromagnetic conduction.

EMI can be caused by TVs, microwaves, cordless phones, motors, and other devices.

Shielding the cables (Shielded Twisted Pair - STP) or source can minimize EMI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RFI?

A

RFI = Radio Frequency Interference

A disturbance that can affect electrical circuits, devices, and cables due to AM/FM transmissions or cell towers.

RFI causes more problems for wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Crosstalk?

A

occurs when a signal transmitted on one copper wire creates an undesired effect on another wire

Most companies use UTP (Unshielded Twisted Pair cabling) because it’s much cheaper to work with. (vs. Shielded Twisted Pair - STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Data Emanation?

A

The electromagnetic field generated by a network cable for device when transmitting.

A Faraday cage can be installed to prevent a room from emanating

To capture them, you need a spectrum analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is PDS ?

A

PDS = protected distribution system

PDS helps you protect network medias. It is a secured system of cable management to ensure that wired network remains free from eavesdropping, tapping, data emanations, and other threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SSID?

A

SSID = Service Set Identifier

Uniquely identifies the network and is the name of the Wireless Access Point (WAP) used by the clients.

For the exam : You should disable the SSID broadcast (hide the name of the Access Point) so that clients have to already know the name of it prior to connecting to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Rogue Access Point?

A

Unauthorized Wireless Access Point (WAP) or Wireless Router that allows access to the secure network. (Hooking up a wireless access point on a port and sending out signal for the devices to connect).

It can introduce its own DHCP server and cause all sorts of other issues.

To prevent this, you should enable MAC filtering on the network, network access control, and run a good IDS or IPS on your network that can detect or prevent these devices when they initially try to connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an Evil Twin?

A

a rogue, counterfeit, and unauthorized WAP with the same SSID as your valid one.

To prevent evil twin from being effective by making sure that all of your wireless clients are configured to use a VPN whenever they connect over Wi-Fi even if they’re connecting to your own Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Pre-Shared Key?

A

Same encryption key is used by the access point and the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Open Encryption in terms of wireless network?

A

No security or protection provided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is WEP?

A

WEP = Wired Equivalent Privacy

Original 802.11 wireless security standard that claims to be as secure as a wired network.

WEP’s weakness is its 24-bit IV (Initialization Vector).

NOT secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is WPA?

A

WPA = WiFi Protected Access

Replacement for WEP which uses TKIP, Message Integrity Check (MIC), and RC4 encryption.

WPA was flawed, so it was replaced by WPA2.

18
Q

What is WPA2?

A

WiFi Protected Access version 2

802.11i standard to provide better wireless security featuring AES with a 128-bit key, CCMP, and integrity checking.

19
Q

What is WPS?

A

WPS = WiFi Protected Setup

Automated encryption setup for wireless networks at a push of a button, but is severely flawed and vulnerable.

Always disable WPS

20
Q

For wireless Security, what else would you have to do In addition to using WPA2 standard for your encryption?

A

you should also set up a VPN for your wireless devices.

Encryption and VPNs are always a good idea.

21
Q

What is WAP?

A

WAP = Wireless Access Points

Wireless security also relies upon proper WAP placement

22
Q

What is Omnidirectional antenna WAP?

A

WAP = Wireless Access Points

access point is going to radiate out its signal equally in every single direction.

23
Q

What is Bidirectional or unidirectional antenna ?

A

WAP = Wireless Access Points

controls which direction the signal is actually radiated

24
Q

What signal does Wireless B, G, and N use?

A

2.4 GHz signal

25
Q

What signal does Wireless A, N, and AC use?

A

5.0 GHz signal

26
Q

What is Wireless security jamming?

A

Intentional radio frequency interference targeting your wireless network to cause a denial of service condition.

Wireless site survey software and spectrum analyzers can help identify jamming and interference.

27
Q

What is AP (Access Point) Isolation ?

A

creates network segment for each client when it connects to prevent them from communicating with other clients on the network

28
Q

What is War Driving Wireless Attack?

A

Act of searching for wireless networks by driving around until you find them. Attackers can use wireless survey or opensource attack tools. They connect to your network so that they can attack other networks through your network.

29
Q

What is War Chalking Wireless attack?

A

Act of physically drawing symbols in public places to denote the open, closed and protected networks in range. War chalking digitally is becoming more commonplace

30
Q

What is IV Attack in terms of wireless attack?

A

attacker observes the operation of a cipher being used with several different keys and finds a mathematical relationship between those keys to determine the clear text data

31
Q

What is WiFi disassociation attack ?

A

targets an individual client connected to a network, forces it offline by deauthenticating it, and then captures the handshake when it reconnects.

Used as part of an attack on WPA/WPA2

32
Q

What is Brute Force Attack ?

A

Attacker continually guesses a password until the correct one is found. Brute force will always find the password eventually. It’s just a matter of time and power it is going to take

33
Q

What is WPA3?

A

Wi-fi Protected Access 3
introduced in 2018 to strengthen WPA2
WPA3 has an equivalent cryptographic strength of 192-bits in WPA3 – Enterprise Mode

34
Q

What encryption does WPA3 Enterprise Mode use?

A

uses AES-256 encryption with a SHA-384 hash for integrity checking

35
Q

What encryption does WPA3 Personal Mode use?

A

Uses CCMP-128 as the minimum encryption required for secure connectivity.

Largest improvement in WPA3 is the removal of the Pre-Shared Key (PSK) exchange.

36
Q

What is Simultaneous Authentication of Equals (SAE) ?

A

a secure password-based authentication and password-authenticated key agreement method. SAE provides forward secrecy

37
Q

What is Perfect Forward Secrecy or Forward Secrecy ?

A

a feature of key agreement protocols (like SAE) that provides assurance that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised

38
Q

What are the 5 step process that Forward Secrecy goes through?

A
  1. The AP and the client use a public key system to generate a pair of long-term keys
  2. The AP and the client exchange a one-time use session key using a secure algorithm like Diffie-Hellman.
  3. The AP sends the client messages and encrypts them using the session key created in Step 2.
  4. Client decrypts the messages received using the same one-time use session key.
  5. The process repeats for every message being sent, starting at Step 2 to ensure forward secrecy.
39
Q

What is Bluejacking ?

A

sending of unsolicited message to Bluetooth-enabled devices such as mobile phones and tablets.

Bluejacking sends information

40
Q

What is Bluesnarfing?

A

unauthorized access of information from wireless device through a Bluetooth connection

Bluesnarfing takes information

41
Q

What is RFID?

A

RFID = Radio Frequency Identification

Devices that use a radio frequency signal to transmit identifying information about the device or token holder.

For the exam: remember that RFID devices can send information from a card to a reader to provide authentication or identification.

42
Q

What is New Field Communication (NFC)

A

It was invented to minimize the ability to eavesdrop on RFID

NFC allows two devices to transmit information when they’re in close proximity to each other