CHP 9 Flashcards

1
Q

NAC

A

Network access control (NAC) is a security solution that enforces policy on devices seeking to access network resources. Network Access Control (NAC) is a security solution that manages and controls access to a network by enforcing policies on devices and users attempting to connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

fact

A

Unfortunately, WPS is vulnerable to a brute force attack. WPA3, is intended to replace WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SAE

A

Simultaneous Authentication of Equals (SAE)
Simultaneous Authentication of Equals (SAE) is a password-based authentication and key exchange protocol used in wireless networks. It provides strong security by resisting offline dictionary attacks and is part of the WPA3 standard. replaces the Pre-Shared Key (PSK) exchange protocol in WPA2, ensuring an attacker cannot intercept the Wi-Fi password even when capturing data from a successful login.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AES GCM

A

AES Galois Counter Mode (GCM)
—replaces AES CCM. AES-GCM (Advanced Encryption Standard - Galois/Counter Mode) is a widely used encryption method that provides both confidentiality and data integrity. It combines the AES encryption algorithm with the Galois/Counter Mode of operation to offer secure and authenticated encryption. A high performance mode of operation for symmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VLANs

A

VLANs (Virtual Local Area Networks) are a method of creating separate, isolated networks within a single physical network. VLANs allow you to segment network traffic logically, improving security and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NBAD

A

Network Behavior and Anomaly Detection (NBAD) is a security technique used to monitor network traffic and identify unusual patterns or anomalies that may indicate potential security threats or network issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UEBA

A

User and Entity Behavior Analytics (UEBA) is a security solution that uses advanced analytics to track and analyze the behaviors of users and entities (such as devices and applications) within a network. UEBA identifies anomalies and potential security threats by comparing current behavior against established patterns of normal behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Web Filtering

A

Its primary function is to block users from accessing malicious or inappropriate websites, thereby protecting the network from potential threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NTA

A

Network Traffic Analysis (NTA) is a security practice that involves monitoring and analyzing network traffic to identify unusual patterns, detect threats, and ensure network performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DLP

A

Data Loss Prevention (DLP) refers to a set of strategies and tools used to ensure that sensitive information does not get lost, misused, or accessed by unauthorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following practices is critical for device hardening by providing a standard set of guidelines or checklists for configuring devices securely?

A.Regular maintenance cycle
B.User awareness training
C.Least functionality principle
D.Monitoring and encryption

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following methods is a replacement for Wi-Fi Protected Setup (WPS) as a more secure means of configuring client devices with the necessary information to access a Wi-Fi network?

A.Device Provisioning Protocol (DPP)
B.Wi-Fi Protected Access 3 (WPA3)
C.Enhanced Open
D.Simultaneous Authentication of Equals (SAE)

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A newly-hired cybersecurity manager of a software company evaluates the available intrusion detection and intrusion prevention capabilities of the company. What method detects changes in normal “baseline” operating data sequences and identifies abnormal sequences?

A.Signature-based detection
B.Behavioral-based detection
C.Network behavior and anomaly detection
D.Network traffic analysis

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company’s IT security specialist decides to upgrade the wireless network infrastructure to enhance data protection during transmissions. Recognizing the importance of strong encryption for wireless data, the specialist evaluates the various encryption standards available. Which wireless encryption standard offers the MOST robust security for protecting wireless data transmissions and has become the preferred choice for many organizations?

A.Wi-Fi Protected Access 3
B.Wired Equivalent Privacy
C.Wi-Fi Protected Access
D.Temporal Key Integrity Protocol

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The network administrator for a large corporation recently detected multiple unauthorized intrusion attempts on the network. As a result, the team deployed an intrusion detection system (IDS) and an intrusion prevention system (IPS). The team aims to block malicious traffic and automatically receive alerts on suspicious activities. The administrator needs to choose an approach that offers real-time protection against active threats and can modify or reject traffic in the network. Based on the desired outcomes and functionality the network administrator requires, which system should the team primarily focus on for real-time traffic modification and blocking active threats?

A.Intrusion Detection System (IDS)
B.Intrusion Prevention System (IPS)
C.Network-based Intrusion Detection System (NIDS)
D.Host-based Intrusion Detection System (HIDS)

A

B