Chapter 4 Sec + Flashcards

1
Q

HIDS

A

Host-based Intrusion Detection System
Is installed on a workstation or a server
Monitor host,detected potential attacks
All traffic from HIDS passed through nic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIDS

A

Network-based Intrusion Detection System
Monitors activity on a network
Uses sensors and collectors that are typically attached to routers and switches.
Uses a central process monitoring appliance
Cannot detect anomalies on workstations and is unable to decrypt encrypted traffic
Refered to passive since it doesn’t go directly through the IDS

Uses signature and trend base detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NoC

A

Network Operations Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IPS

A

Intrusion Prevention Systems
Can Detect, React and Prevent Attacks.
Refered to as active since all traffic passes through the IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

HIPS

A

Host-based Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIPS

A

Network-based Intrusion Prevention Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

APT

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RAT

A

Remote Access Trojan are installed on internal networks through phishing or malware attacks and attacks can attack from within the internal network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WLAN

A

Wireless Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AP

A

Wireless Access point
All wireless routers are AP
Not all aps are wireless routers
Can also provide extra service
NAT/PAT/DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SSID

A

Service Set Identifier
Wireless networks are identified by a SSID, which is simply the wireless networking name
Can be changed by admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WAN

A

Wide Area Network
2 or More LANs connected together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WEP

A

Wireless Equivalent Privacy
Weak protocol that’s legacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPA 1/2/3

A

Wifi Protected Access is crypto graphic protocol
Uses strong protocols such as AES and CCMP

Has 2 modes PSK and Enterprise Mode

WPA 3 uses Enhanced mode and SAE modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EAP

A

Extensible Authentication Protocol
Provides a method for 2 systems to create a secure encryption key,also known as a PMK.Then uses a PTK to encrypt all data transmitted between devices

It provides an authentication framework that provides general guidance for authentication methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PMK

A

Pair-wise Master Key
Used with Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PTK

A

Pair-wise Transient Key
Used to encrypt all data transmitted between wireless devices using Extensible Authentication Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PEAP

A

Protected Equivalent Authentication Protocol
Provides an extra layer of protection for EAP
Protects communication channel by encapsulating and encrypting the EAP conversation in a TLS tunnel
Requires a cert on the server but not client
Is implementated with Ms-CHAPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MS-CHAPv2

A

Microsoft Challenge Handshake Authentication Protocol Version 2 used with PEAP

20
Q

AES

A

Advanced Encryption Standard
Used with WPA2

21
Q

CCMP

A

Counter-mode Cipher Block Chaining Message Protocol
Used with WPA2

22
Q

EAP-Fast

A

Extensible Authentication Protocol Flexible authentication via Tunneling as a secure replacement for (LEAP) lightweight EAP
EAP-Fast supports PAC instead of credentials

23
Q

PAC

A

Protected Access Credentials
Used with EAP-Fast

24
Q

EAP-TLS

A

Equivalent Authentication Protocol Transport Layer Security
Is one of the most secure EAP standards because it requires certs on the client side and the 802.11x server.

25
Q

EAP-TTLS

A

Extensible Authentication Protocol Tunneled TLS
Is an extension of EAP-TLS allowing
Systems to use older Authentication models within TLS tunnel
Requires a certificate on the 802.1x Server

26
Q

AUP

A

Acceptable Use Policy

27
Q

WPS

A

Wifi Protected Setup
Allows users to configure wireless devices without typing in passphrase
-used can instead configure devices by pressing buttons or entering short pin

28
Q

IV

A

Initialization Vector

29
Q

NFC

A

Near Field Communications
Used with cards to make purchases and share data between phones
Uses readers
Two way Communication
Used within 0-5 meters

30
Q

RFID

A

Radio Field Identification
Uses a Reader and tags
One-way communication
Used to track objects

31
Q

DoS

A

Denial of Service

32
Q

PAN

A

Personal Area Network

33
Q

VPN

A

Virtual Private Network
Is often used for remote access to public or private networks

34
Q

IPSEC

A

Internet Protocol Security
Used with VPNs

35
Q

RADIUS

A

Remote Authentication Dial-In User Service
Is a Centralized Authentication Service
VPN Server authenticates clients through a RADIUS server with it’s database or forward it to a LDAP

36
Q

AH

A

Authentication Header
IPsec provides security with AH
Provides Authentication and integrity

37
Q

ESP

A

Encapsulating Security Payload is part of IPSec
Used to encrypt the data and provide CIA

38
Q

IKE

A

Internet Key Exchange used
with IPSEC over port 500 to authentication clients
Creates a Security Associations for the VPN and uses these to setup a secure channel between the client and VPN server

39
Q

SSTP

A

Secure Socket Tunneling Protocol
Encrypts traffic using TLS over port 443 TCP
And is a useful alternative when VPN tunnel must go through a device using NAT, and IPsec is not feasible

40
Q

L2TP

A

Layer 2 Tunneling Protocol
Is a Tunneling Protocol that is also used for VPNs
L2TP doesnt provide encryptionn by itself and relies on IPsec

41
Q

HTML 5 VPN Portal

A

Hypertext Markup Language 5 VPN portal
Allows users to connect to the VPN using their web browsers

42
Q

NAC

A

Network Access Control
Inspects computers and other devices to see if they met the health requirements to join network if not they are sent to a remediation network.
Uses Agent and agentless

43
Q

PAP

A

Password Authentication Protocol
Is used with Point-to-Point to authenticate clients

44
Q

PPP

A

Point-to-Point Protocol
Used with PAP

45
Q

CHAP

A

Challenge Handshake Authentication Protocol
Uses PPP and authenticates remote users but is more secure then pap
Goal is to allow clients to pass credentials over a public network without allowing attackers to intercept the data

46
Q

TACACS+

A

Terminal Access Controller Access Control System Plus
Alternative to RADIUS
Provides 2 security benefits over RADIUS
-encrypts the entire authentication process
-used multiple challenges and responses between the client and the server

Orgs uses it as an authentication service for network devices

47
Q

BYOD

A

Bring Your Own Device