ch7 Beyond the Basic LAN Flashcards

1
Q

Wireless Access Points are made with an identifying __, which can be __ in the case of a single WAP or ___ if the network has more than one of them

A

Service Set Identifier (SSID); Basic; Extended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

when a Client sends a request to a WAP, that client is added to the WAP’s ___

A

Associated List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

does the 802.11 standard contain any encryption of authentication?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ was the first system developed to give basic authorization and encryption to 802.11, using the ___ protocol

A

Wired Equivalency Privacy (WEP); RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the 802.11i standard uses ___ for authentication and ___ for encryption

A

802.1x; AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

because most network hardware initially couldn’t handle the 802.11i standard, the ___ was developed for the transition, but has since been renamed ___

A

Temporal Key Integrity Protocol (TKIP); Wireless Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

it is sometimes possible to carry out a Replay Attack after someone logs into a wireless network by retrieving the ___ and extracting their password. This process is also known as ___

A

Session Key; SSL stripping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is when a server requires that users use secure protocols for their entire session

A

HTTP Strict Transport Security (HSTS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

if someone plugs their personal wireless access point into a LAN this is called a ___, but if they change its SSID to match yours, then it’s an ___

A

Rogue Access Point; Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

to boot people off a wireless network (so they are forced to login to an evil twin) either an illegal device called a ___ is used, or the command ___

A

802.11 Jammer; deauth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

to harden a wireless network against attack, it is important to know all ___ and maintain ___

A

MAC and IP addresses for everything connected; patches and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

for good WiFi coverage across a large flat area, use a ___ antenna; for a more 3D area use a ___ antenna; for a narrow but long distance use a ___ antenna and for just one side of a wall use a ___ antenna

A

Dipole; OMNI; Directional; Patch Graphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

to improve WiFi signal bandwidth, you could try changing the ___ from 2.4 GHz to 5 GHz, or adjust the ___

A

Band; Channel Width

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ means mimicking a different set of hardware than exists on a machine, whereas ___ means creating a new computer with it’s own OS but the same hardware

A

emulation; virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

three advantages of virtualization are:

A

consolidation of hardware; easier system recovery; convenience of IT research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a ___ allows you to see the different virtual machines, and can be either Type ___, launched on boot and independent of the OS, or type ___, which runs on top of the OS

A

Hypervisor; 1; 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

three threats to a virtualized network are:

A

Malware, VM Sprawl; VM Escape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

the following three steps should be taken to harden a virtualized network:

A

cleaning data remnants; good policies; keeping patches updated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

while not appropriate for wireless networks in general ___ is great for securing an HVAC system control

A

MAC Filtering

20
Q

a ___ holds an application and all the files it depends on, isolating them from the rest of the system

21
Q

in ___, a 3rd party owns all the hardware, but makes it available through virtual machines

A

Infrastructure as a Service (IaaS)

22
Q

in ___, a 3rd party supplies everything needed for software development via virtual machines

A

Platform as a Service (PaaS)

23
Q

in ___, a 3rd party owns the software you need, making it available for use online via a subscription

A

Software as a Service (SaaS)

24
Q

a good practice for hardening wireless networks is to enable ___ so devices can’t see each other on the network

A

AP Isolation

25
with WPA2 protected systems, it is particularly important to use ___
long complex passwords
26
Client's can notice and report ___ and ___ on a wireless network to help with security
unfamiliar SSID's; unexpected requirements to login again
27
virtual computers are often best deployed as ___
Virtual Desktop Integration (VDI)
28
the Internet of Things is a collections of ___
Static Hosts
29
a ___ system is used to control devices, usually over a WAN, spread out over a large geographic area
Secure Control and Data Acquisition (SCDA)
30
___, although it doesn't have encryption, tends to be secure because of the close proximity/contact between devices required
Near Field Communication (NFC)
31
when a company issues cellphones to it's employees that are not for personal use, this is a ___ deployment
Corporate Owned, Business Only (COBO)
32
when a company issues cellphones, but employees have a degree of control over how they are configured this is a ___ deployment
Corporate Owned, Personally Enabled (COPE)
33
when a company provides cellphones, but employees can choose from a list this is a ___ deployment
Choose Your Own Device (CYOD)
34
when employees in a company can use their own phones with company software this is a ___ deployment
Bring Your Own Device (BYOD)
35
when users load software onto a cellphone from an unofficial source, this is called ___
sideloading
36
when a user is given a cellphone from a major carrier and changes to al alternative carrier to save money, this is called ___ and is a problem for companies because ___
carrier unlocking; the company may be unable to track the activity of the phone
37
when a user gains administrative access and installs custom firmware on a cellphone, this is called ___, or on an iPhone ___, and makes the phone vulnerable to ___
rooting; jailbreaking; malware
38
cellphone firmware ___ updates can become expensive due to data usage, and can be turned off
over the air
39
the best way to secure data on a cellphone when it is lost is with ___
Remote wipe
40
outside lighting, signage and security guards are examples of ___ physical security controls
deterrent
41
fences and barricades are examples of ___ physical security controls
Preventative
42
screen filters for desktop computers are examples of ___ physical security controls
Preventative
43
alarms and cameras are examples of ___ physical security controls
Detective
44
Infrared cameras are useful for protecting computer equipment because they ___
can detect heat spots
45
securing an HVAC remote monitoring system would mean making sure vendors use ___ or ___ to connect
VPN; 802.1x
46
always use ___ for fire suppression in server rooms
FM-200