Chapter 5 - Domain 5 Network Security Flashcards

1
Q

What two wireless encryption protocols are no longer considered secure & should not be used if security is a goal?

A

page 178

WEP & WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What two distinct advantages does WPA have over WEP?

A

page 178

  • Temporal Key Integrity Protocol (TKIP)
  • Extensible Authentication Protocol (EAP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What additional advantages does WPA2 offer?

A

page 178

  • Advanced Encryption Standard (AES)
  • Implements CCMP, based on 802.11i standard & offers enhanced data cryptographic mechanism that replaces TKIP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does MAC Address Filtering help in security measures?

A

page 179

  • Configured to allow only specific MAC address through an interface on the Wireless Access Point (WAP)
  • MAC Filtering should be used in conjunction with other security measures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a method of identifying traffic & then making decisions based on the attributes of that traffic?

A

page 180

Access Control List (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two methods of IP filtering & why is one method is made less secure?

A

page 181

  • Pass only the desired IP traffic & BLOCK everything else
  • Pass everything & block only traffic specifically configured to be blocked
    • some traffic that is forgotten will be passed , therefore less secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three main groups of Ports in Port filtering?

A

page 181
Well Know Ports - 0 to 1023
Registered Ports - 1024 to 49151
Dynamic or Private Ports - 49152 to 65535

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which ports are used by applications or services that need to have consistent port assignments?

A

page 181

Registered Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which ports are not assigned to any particular protocol or service & can therefore be used for any service or application?

A

page 181

Dynamic or Private Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the process of encapsulating one protocol within another so as to provide a secure communication through an unsecured medium, typically the Internet?

A

page 182

Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does L2TP work?

A

page 182
Layer 2 Tunneling Protocol
Uses IPSec to authenticate the client in two phases
1. Authenticates the computer to prevent a man-in-middle attack
2. Authenticates the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly