Chapter 4 Sec + Flashcards

1
Q

HIDS

A

Host-based Intrusion Detection System
Is installed on a workstation or a server
Monitor host,detected potential attacks
All traffic from HIDS passed through nic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIDS

A

Network-based Intrusion Detection System
Monitors activity on a network
Uses sensors and collectors that are typically attached to routers and switches.
Uses a central process monitoring appliance
Cannot detect anomalies on workstations and is unable to decrypt encrypted traffic
Refered to passive since it doesn’t go directly through the IDS

Uses signature and trend base detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NoC

A

Network Operations Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IPS

A

Intrusion Prevention Systems
Can Detect, React and Prevent Attacks.
Refered to as active since all traffic passes through the IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HIPS

A

Host-based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIPS

A

Network-based Intrusion Prevention Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RAT

A

Remote Access Trojan are installed on internal networks through phishing or malware attacks and attacks can attack from within the internal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WLAN

A

Wireless Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AP

A

Wireless Access point
All wireless routers are AP
Not all aps are wireless routers
Can also provide extra service
NAT/PAT/DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSID

A

Service Set Identifier
Wireless networks are identified by a SSID, which is simply the wireless networking name
Can be changed by admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WAN

A

Wide Area Network
2 or More LANs connected together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WEP

A

Wireless Equivalent Privacy
Weak protocol that’s legacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPA 1/2/3

A

Wifi Protected Access is crypto graphic protocol
Uses strong protocols such as AES and CCMP

Has 2 modes PSK and Enterprise Mode

WPA 3 uses Enhanced mode and SAE modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EAP

A

Extensible Authentication Protocol
Provides a method for 2 systems to create a secure encryption key,also known as a PMK.Then uses a PTK to encrypt all data transmitted between devices

It provides an authentication framework that provides general guidance for authentication methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PMK

A

Pair-wise Master Key
Used with Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PTK

A

Pair-wise Transient Key
Used to encrypt all data transmitted between wireless devices using Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PEAP

A

Protected Equivalent Authentication Protocol
Provides an extra layer of protection for EAP
Protects communication channel by encapsulating and encrypting the EAP conversation in a TLS tunnel
Requires a cert on the server but not client
Is implementated with Ms-CHAPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MS-CHAPv2

A

Microsoft Challenge Handshake Authentication Protocol Version 2 used with PEAP

20
Q

AES

A

Advanced Encryption Standard
Used with WPA2

21
Q

CCMP

A

Counter-mode Cipher Block Chaining Message Protocol
Used with WPA2

22
Q

EAP-Fast

A

Extensible Authentication Protocol Flexible authentication via Tunneling as a secure replacement for (LEAP) lightweight EAP
EAP-Fast supports PAC instead of credentials

23
Q

PAC

A

Protected Access Credentials
Used with EAP-Fast

24
Q

EAP-TLS

A

Equivalent Authentication Protocol Transport Layer Security
Is one of the most secure EAP standards because it requires certs on the client side and the 802.11x server.

25
EAP-TTLS
Extensible Authentication Protocol Tunneled TLS Is an extension of EAP-TLS allowing Systems to use older Authentication models within TLS tunnel Requires a certificate on the 802.1x Server
26
AUP
Acceptable Use Policy
27
WPS
Wifi Protected Setup Allows users to configure wireless devices without typing in passphrase -used can instead configure devices by pressing buttons or entering short pin
28
IV
Initialization Vector
29
NFC
Near Field Communications Used with cards to make purchases and share data between phones Uses readers Two way Communication Used within 0-5 meters
30
RFID
Radio Field Identification Uses a Reader and tags One-way communication Used to track objects
31
DoS
Denial of Service
32
PAN
Personal Area Network
33
VPN
Virtual Private Network Is often used for remote access to public or private networks
34
IPSEC
Internet Protocol Security Used with VPNs
35
RADIUS
Remote Authentication Dial-In User Service Is a Centralized Authentication Service VPN Server authenticates clients through a RADIUS server with it's database or forward it to a LDAP
36
AH
Authentication Header IPsec provides security with AH Provides Authentication and integrity
37
ESP
Encapsulating Security Payload is part of IPSec Used to encrypt the data and provide CIA
38
IKE
Internet Key Exchange used with IPSEC over port 500 to authentication clients Creates a Security Associations for the VPN and uses these to setup a secure channel between the client and VPN server
39
SSTP
Secure Socket Tunneling Protocol Encrypts traffic using TLS over port 443 TCP And is a useful alternative when VPN tunnel must go through a device using NAT, and IPsec is not feasible
40
L2TP
Layer 2 Tunneling Protocol Is a Tunneling Protocol that is also used for VPNs L2TP doesnt provide encryptionn by itself and relies on IPsec
41
HTML 5 VPN Portal
Hypertext Markup Language 5 VPN portal Allows users to connect to the VPN using their web browsers
42
NAC
Network Access Control Inspects computers and other devices to see if they met the health requirements to join network if not they are sent to a remediation network. Uses Agent and agentless
43
PAP
Password Authentication Protocol Is used with Point-to-Point to authenticate clients
44
PPP
Point-to-Point Protocol Used with PAP
45
CHAP
Challenge Handshake Authentication Protocol Uses PPP and authenticates remote users but is more secure then pap Goal is to allow clients to pass credentials over a public network without allowing attackers to intercept the data
46
TACACS+
Terminal Access Controller Access Control System Plus Alternative to RADIUS Provides 2 security benefits over RADIUS -encrypts the entire authentication process -used multiple challenges and responses between the client and the server Orgs uses it as an authentication service for network devices
47
BYOD
Bring Your Own Device