Chapter 4: Securing Your Network Flashcards

1
Q

______ and _____ inspect traffic using the same functionality as a protocol analyzer.

A

Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A _____ can detect attacks on local systems such as workstations and servers. The HIDS protects local resources on the host and can detect some malware that isn’t detected by traditional antivirus software.

A

host-based IDS (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ______ detects attacks on networks.

A

network-based

IDS (NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A signature-based IDS or IPS uses _____ to detect known attacks or vulnerabilities.

A

signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____-based or ______-based IDSs (also called anomaly-based IDSs) require a baseline and detect attacks based on anomalies or when traffic is outside expected boundaries.

A

Heuristic-based or behavioral-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A _____ _____ incorrectly raises an alert indicating an attack when an attack is not active. They increase the workload of administrators.

A

false positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A ____ _____ is when an attack is active, but not reported.

A

false negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An IPS is similar to an active IDS except that it’s placed ____ with the traffic and can stop attacks before they reach the internal network. An IPS can actively monitor data streams, detect malicious content, and prevent it from reaching a network. In contrast, an IDS is out-of-band.

A

inline/ in-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IDSs and IPSs can also protect internal private networks, such as ________ and _______

A

private supervisory control and data acquisition (SCADA) networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ ______ are dedicated hardware devices that handle Transport Layer Security (TLS) traffic.

A

SSL/TLS accelerators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ _______ allow an organization to inspect traffic, even when traffic is using SSL or TLS.

A

SSL decryptors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A ______ _____ _____ uses virtualization technologies to route traffic instead of using hardware routers and switches. It separates the data and control planes.

A

software defined network (SDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ and _____ appear to have valuable data and attempt to divert attackers away from live networks. Security personnel use them to observe current attack methodologies and gather intelligence on attacks.

A

Honeypots and honeynets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An _____ provides strong port security using port-based authentication. It prevents rogue devices from connecting to a network by ensuring that only authorized clients can connect.

A

802.1x server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____ ____ ____ connect wireless clients to a wired network.

A

Wireless access points (APs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____ _____, also known as a stand-alone AP, includes everything
needed to connect wireless clients to a wireless network.

A

fat AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_____ _____ are controller-based APs. A controller configures and manages a thin AP.

A

Thin APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The ___ ____ _____ is the name of the wireless network. Disabling the SSID broadcast hides a wireless network from casual users.

A

service set identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You can restrict access to wireless networks with ___ ___ ___ filtering. However, attackers can discover authorized MACs and spoof an authorized MAC address.

A

media access control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Most WAPs have _____ antennas. ____ antennas

have narrower beams and longer ranges.

A

omnidirectional antennas. Directional antennas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

An ___ ___ wireless network is two or more devices connected together without an AP.

A

ad hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Wi-Fi Protected Access (WPA) can use Temporal Key Integrity Protocol (TKIP) or Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP). Both WPA and TKIP have been ______.

A

deprecated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Personal mode uses a ___ ____ ____. It is easy to implement and is used in many smaller wireless networks.

A

pre-shared key (PSK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

______ mode is more secure than Personal mode because it adds authentication. It uses an 802.1x authentication server implemented as a RADIUS server.

A

Enterprise

25
Q

_____ mode doesn’t use a PSK or an 802.1x server. Many hot spots use Open mode when providing free wireless access to customers.

A

Open

26
Q

_____ servers use one of the Extensible Authentication Protocol (EAP) versions, such as Protected EAP (PEAP), EAP-Tunneled TLS (EAP-TTLS), EAP-TLS, or EAP-Flexible Authentication via Secure Tunneling (EAP-FAST).

A

802.1x

27
Q

The most secure EAP method is _____, and it requires a certificate on the server and on each of the wireless clients.

A

EAP-TLS

28
Q

_____ and _____ require a certificate on the server, but not the client.

A

PEAP and EAP-TTLS

29
Q

_____ is often implemented with Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2).

A

PEAP

30
Q

LEAP is proprietary to Cisco and does not require a certificate. Cisco designed _____ to replace Lightweight EAP (LEAP).

A

EAP-FAST

31
Q

A _____ _____ forces wireless clients to complete a process, such as acknowledging a policy or paying for access, before it grants them access to the network.

A

captive portal

32
Q

A _____ _____ effectively removes a wireless client from a wireless network, forcing it to reauthenticate.

A

disassociation attack

33
Q

___ ___ ____allows users to easily configure a wireless device by pressing a button or entering a short PIN. WPS is not secure. A WPS attack can discover the PIN within hours. It then uses the PIN to discover the passphrase.

A

Wi-Fi Protected Setup (WPS)

34
Q

A ____ ____ ___ is an AP placed within a network without official authorization. An evil twin is a rogue access point with the same SSID as a legitimate access point.

A

rogue access point (rogue AP)

35
Q

A ____ attack floods a wireless frequency with noise, blocking wireless traffic.

A

jamming

36
Q

An _____ _____ attack attempts to discover the IV and uses it to discover the passphrase.

A

initialization vector (IV)

37
Q

____ _____ _____ attacks use an NFC reader to

read data from mobile devices.

A

Near field communication (NFC)

38
Q

_____ is the practice of sending unsolicited messages to a phone. _____ is the unauthorized access to, or theft of information from, a Bluetooth device.

A

Bluejacking

Bluesnarfing

39
Q

In a _____ _____ attack, an attacker captures data sent between two entities, modifies it, and then impersonates one of the parties by replaying the data. WPA2 using CCMP and AES prevents wireless replay attacks.

A

wireless replay

40
Q

___-_____ _____ attacks include eavesdropping, replay, and DoS.

A

Radio-frequency identification (RFID)

41
Q

A ____ ____ ____ provides access to private networks via a public network, such as the Internet. _____ concentrators are dedicated devices that provide secure remote access to remote users.

A

virtual private network (VPN) x 2

42
Q

_____ is a common tunneling protocol used with VPNs. It secures traffic within a tunnel. It provides authentication with an Authentication Header (AH). Encapsulating Security Payload (ESP) encrypts VPN traffic and provides confidentiality, integrity, and authentication.

A

IPsec

43
Q

IPsec ____ mode encrypts the entire IP packet used in the internal network. IPsec _____ mode only encrypts the payload and is commonly used in private networks, but not with VPNs.

A

Tunnel

Transport

44
Q

Some VPNs use____ to encrypt traffic within the VPN tunnel.

A

TLS

45
Q

A ____ tunnel encrypts all traffic after a user has connected to a VPN. A ____ tunnel only encrypts traffic destined for the VPN’s private network.

A

full

split

46
Q

___-__-____ VPNs provide secure access between two networks. These can be on- demand VPNs or always-on VPNs.

A

Site-to-site

47
Q

____ ____ can also use always-on VPNs to protect traffic when users connect to public hot spots.

A

Mobile devices

48
Q

____ ____ ____ inspects clients for specific health conditions such as up- to-date antivirus software, and can redirect unhealthy clients to a remediation network.

A

Network access control (NAC)

49
Q

A _____ NAC agent (sometimes called a persistent NAC agent) is installed on the client and stays on the client. A _____ NAC agent (sometimes called agentless) is downloaded and run on the client when the client logs on, and deleted after the session ends; they agents are commonly used for employee-owned mobile devices.

A

permanent

dissolvable

50
Q

____ ____ ____ is used when a user accesses a private network from a remote location, such as with a VPN connection.

A

Remote access authentication

51
Q

___ ____ ____ uses a password or PIN for authentication. A significant weakness is that it sends passwords across a network in cleartext.

A

Password Authentication Protocol (PAP)

52
Q

____ ____ ____ ____is more secure than PAP and uses a handshake process when authenticating clients.

A

Challenge Handshake Authentication Protocol (CHAP)

53
Q

_____ and _____ are the Microsoft improvement over CHAP.

A

MS-CHAP and MS-CHAPv2

54
Q

MS-CHAPv2 provides mutual _____.

A

authentication

55
Q

______ provides central authentication for multiple remote access services. It relies on the use of shared secrets and only encrypts the password during the authentication process. It uses UDP.

A

RADIUS

56
Q

_____ is used by some Cisco systems as an alternative to RADIUS. It uses TCP, encrypts the entire authentication process, and supports multiple challenges and responses.

A

TACACS+

57
Q

_____ is an improvement over RADIUS. It uses TCP,

encrypts the entire authentication process, and supports many additional capabilities.

A

Diameter

58
Q

RADIUS, TACACS+, and Diameter are all _____, _____, and _____ protocols.

A

authentication, authorization, and accounting