ch7 Beyond the Basic LAN Flashcards

1
Q

Wireless Access Points are made with an identifying __, which can be __ in the case of a single WAP or ___ if the network has more than one of them

A

Service Set Identifier (SSID); Basic; Extended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when a Client sends a request to a WAP, that client is added to the WAP’s ___

A

Associated List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

does the 802.11 standard contain any encryption of authentication?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ was the first system developed to give basic authorization and encryption to 802.11, using the ___ protocol

A

Wired Equivalency Privacy (WEP); RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the 802.11i standard uses ___ for authentication and ___ for encryption

A

802.1x; AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

because most network hardware initially couldn’t handle the 802.11i standard, the ___ was developed for the transition, but has since been renamed ___

A

Temporal Key Integrity Protocol (TKIP); Wireless Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

it is sometimes possible to carry out a Replay Attack after someone logs into a wireless network by retrieving the ___ and extracting their password. This process is also known as ___

A

Session Key; SSL stripping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is when a server requires that users use secure protocols for their entire session

A

HTTP Strict Transport Security (HSTS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

if someone plugs their personal wireless access point into a LAN this is called a ___, but if they change its SSID to match yours, then it’s an ___

A

Rogue Access Point; Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

to boot people off a wireless network (so they are forced to login to an evil twin) either an illegal device called a ___ is used, or the command ___

A

802.11 Jammer; deauth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

to harden a wireless network against attack, it is important to know all ___ and maintain ___

A

MAC and IP addresses for everything connected; patches and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

for good WiFi coverage across a large flat area, use a ___ antenna; for a more 3D area use a ___ antenna; for a narrow but long distance use a ___ antenna and for just one side of a wall use a ___ antenna

A

Dipole; OMNI; Directional; Patch Graphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

to improve WiFi signal bandwidth, you could try changing the ___ from 2.4 GHz to 5 GHz, or adjust the ___

A

Band; Channel Width

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ means mimicking a different set of hardware than exists on a machine, whereas ___ means creating a new computer with it’s own OS but the same hardware

A

emulation; virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

three advantages of virtualization are:

A

consolidation of hardware; easier system recovery; convenience of IT research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a ___ allows you to see the different virtual machines, and can be either Type ___, launched on boot and independent of the OS, or type ___, which runs on top of the OS

A

Hypervisor; 1; 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

three threats to a virtualized network are:

A

Malware, VM Sprawl; VM Escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the following three steps should be taken to harden a virtualized network:

A

cleaning data remnants; good policies; keeping patches updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

while not appropriate for wireless networks in general ___ is great for securing an HVAC system control

A

MAC Filtering

20
Q

a ___ holds an application and all the files it depends on, isolating them from the rest of the system

A

Container

21
Q

in ___, a 3rd party owns all the hardware, but makes it available through virtual machines

A

Infrastructure as a Service (IaaS)

22
Q

in ___, a 3rd party supplies everything needed for software development via virtual machines

A

Platform as a Service (PaaS)

23
Q

in ___, a 3rd party owns the software you need, making it available for use online via a subscription

A

Software as a Service (SaaS)

24
Q

a good practice for hardening wireless networks is to enable ___ so devices can’t see each other on the network

A

AP Isolation

25
Q

with WPA2 protected systems, it is particularly important to use ___

A

long complex passwords

26
Q

Client’s can notice and report ___ and ___ on a wireless network to help with security

A

unfamiliar SSID’s; unexpected requirements to login again

27
Q

virtual computers are often best deployed as ___

A

Virtual Desktop Integration (VDI)

28
Q

the Internet of Things is a collections of ___

A

Static Hosts

29
Q

a ___ system is used to control devices, usually over a WAN, spread out over a large geographic area

A

Secure Control and Data Acquisition (SCDA)

30
Q

___, although it doesn’t have encryption, tends to be secure because of the close proximity/contact between devices required

A

Near Field Communication (NFC)

31
Q

when a company issues cellphones to it’s employees that are not for personal use, this is a ___ deployment

A

Corporate Owned, Business Only (COBO)

32
Q

when a company issues cellphones, but employees have a degree of control over how they are configured this is a ___ deployment

A

Corporate Owned, Personally Enabled (COPE)

33
Q

when a company provides cellphones, but employees can choose from a list this is a ___ deployment

A

Choose Your Own Device (CYOD)

34
Q

when employees in a company can use their own phones with company software this is a ___ deployment

A

Bring Your Own Device (BYOD)

35
Q

when users load software onto a cellphone from an unofficial source, this is called ___

A

sideloading

36
Q

when a user is given a cellphone from a major carrier and changes to al alternative carrier to save money, this is called ___ and is a problem for companies because ___

A

carrier unlocking; the company may be unable to track the activity of the phone

37
Q

when a user gains administrative access and installs custom firmware on a cellphone, this is called ___, or on an iPhone ___, and makes the phone vulnerable to ___

A

rooting; jailbreaking; malware

38
Q

cellphone firmware ___ updates can become expensive due to data usage, and can be turned off

A

over the air

39
Q

the best way to secure data on a cellphone when it is lost is with ___

A

Remote wipe

40
Q

outside lighting, signage and security guards are examples of ___ physical security controls

A

deterrent

41
Q

fences and barricades are examples of ___ physical security controls

A

Preventative

42
Q

screen filters for desktop computers are examples of ___ physical security controls

A

Preventative

43
Q

alarms and cameras are examples of ___ physical security controls

A

Detective

44
Q

Infrared cameras are useful for protecting computer equipment because they ___

A

can detect heat spots

45
Q

securing an HVAC remote monitoring system would mean making sure vendors use ___ or ___ to connect

A

VPN; 802.1x

46
Q

always use ___ for fire suppression in server rooms

A

FM-200