CISSP Domain 4: Assessing and Implementing Secure Principles in Network Architectures Flashcards

1
Q

What’s Keep it Simple?

A
  • complexity is the worst enemy of security
  • best-in-suite over best-in-breed solutions are one approach used to simplify defense in-depth
  • simplicity helps to avoid configuration mistakes
  • enables organizations to move forward improving incrementally, rather than demanding perfection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does Best-in-Suite mean?

A
  • a software solution that offers a comprehensive and integrated set of functionalities within a single package or suite
  • a software vendor strives to deliver a cohesive and unified solution where different modules or components seamlessly work together
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Best-in-Breed mean?

A
  • software approach that focuses on selecting and integrating individual software applications or solutions that are considered the best or most specialized in their respective domains
  • prioritizes functionality and performance over integration and consolidation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which IEEE standard defines bluetooth?

A

802.15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of network architecture is bluetooth?

A

Personal Area Network (PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How are connections set up with bluetooth?

A

with pairing where primary device scans the 2.4 GHz radio frequencies for available devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What mechanism prevents accidental pairing?

A

4 digit code (often 0000)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s bluejacking?

A
  • annoyance where pranksters push unsolicited messages to engage or annoy other nearby bluetoth users by taking advantage of a loophole in the technology’s messaging options
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s bluesnarfing?

A
  • data theft
  • thieves wirelessly connect to some early bluetooth enabled mobile devices without the owner’s knowledge to download and/or alter phonebooks, calendars or worse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s bluebugging?

A
  • attack that grants hackers remote control over he feature and functions of a bluetooth device
  • could include the ability to turn on the microphone to use the phone as an audio bug
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do wireless networks announce their SSID on a regular basis?

A

broadcast with a beacon frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hiding SSID is considered which security technique?

A

security through obscurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does SSID stand for?

A

Service Set Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is TKIP and what does it stand for?

A
  • Temorary Key Integrity Protocol
  • designed to replace WEP without the need to replace legacy hardware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What was TKIP implemented to?

A

802.11 wireless networking under the name WPA (WI-Fi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s CCMP?

A
  • Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
  • uses AES 128
  • created to replace WEP and TKIP (WPA)
  • used with WPA2, which replaced WEP and WPA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What’s Fibre Channel?

A

a form of network data storage solution (SAN) or NAS, that allows for high-speed file transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What’s Fibre Channel Over Ethernet (FCoE)?

A

used to encapsulate Fibre Channel communication over Ethernet networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What’s iSCSI

A
  • stands for Internet Small Computer System Interface
  • networking storage standard based on IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What’s Site Survey?

A

process of investigating the presence of strength and reach of wireless access points deployed in the environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does EAP stand for?

A

Extensible Authentication Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What’s PEAP?

A
  • encapsulates EAP methods with a TLS tunnel that provides authentication and potenially encryption
  • P stands for Protected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What’s LEAP?

A
  • Cisco’s proprietary alternative to TKIP and WPA
  • developed to address deficincies in TKIP before 802.11i/WPA2 system was ratified as a standard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are different antena types? (7)

A
  • monopole
  • panel
  • dipole
  • loop
  • cantenna
  • yagi
  • parabolic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is loop antenna used for and how does it receive signal?

A
  • used for TV and RFID systems
  • omnidirectional if horizontally mounted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is monopole antenna used for and how does it receive signal?

A
  • can send and receive signals in all directions perpendicular to the line of the antenna itself
  • used with wifi routers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is dipole antenna used for and how does it receive signal?

A
  • omnidirectional antenna essentially composed of two monopoles
  • generates powerful signal in restricted space
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is panel antenna?

A

flat devices that focus from only one side of the panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is parabolic antenna?

A

used to focus signals from very long distances or weak sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is yagi antenna?

A

crafted from straight bar with cross sections to catch specific radio frequencies in the direction of the main bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is cantenna antenna?

A
  • constructed from tubes with one sealed end
  • focus along the direction of the open end of the tube
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are examples of some of the private circuit technologies?

A
  • PPP
  • SLIP
  • ISDN
  • DSL
  • dedicated or leased lines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are examples of packet switching WAN technologies

A
  • use virtual circuits - efficient and cost effective
  • X.25, Frame Relay
  • Asynchronous Transfer Mode (ATM)
  • Synchornous Data Link Control (SDLC)
  • High-Level Data Link Control (HDLC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What’s a circuit-level firewall?

A
  • firewall that operates at the session layer (Layer 5) of the OSI model
  • works by monitoring the TCP handshaking process between two network endpoints (usually a client and a server) without inspecting the contents of the actual data being transmitted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What’s the main function of a circuit-level firewall?

A
  • establish and manage network connections or sessions between internal and external networks
  • ensures that the connections are legitimate and authorized based on a set of predefined rules
  • once a connection is established, the circuit-level firewall creates a virtual circuit, or “stateful connection,” allowing subsequent packets to pass through without further inspection. It maintains information about the state of the connection, including source and destination IP addresses, ports, and connection status
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Do circuit-level firewalls inspect content?

A

they do not inspect the content of the data packets, making them less effective at detecting and blocking specific types of attacks or malicious activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What’s an example of a circtuit-level firewall?

A

SOCKS (Socket Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What’s deep packet inspection?

A

packet inspection that inspects and filters both the header and payload of a packet that is transmitted through an inspection point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Describe IDS

A
  • analyzes whole packets - both headers and payload, looking for known events
  • when a known event is detected, a log message is generated
  • reports and alerts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Describe IPS

A
  • analyzes whole packets - both headers and payload, looking for known events
  • when a known event is detected, packet is rejected
  • blocks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What’s Behavior Based IDS?

A
  • creates a baseline of activity to identify normal behavior and then measures system performance against the baseline to detect abnormal behavior
  • can detect unknown attack methods
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What’s Knowledge Based IDS?

A
  • uses signatures similar to the signature definitions used by ant-malware software
  • only effective against known attacke methods
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What’s a bastion host?

A

computer or appliance that is exposed on the internet and has been hardened by removing unnecessary elemets such as services, programs, protocols and ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What’s Screened Host?

A

firewall-protected system logically positioned just inside a private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What’s screened subnet?

A

similar to the screened host in concept, except a subnet is placed between two routers or firewalls and the bastion host(s) is located within that subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What’s the purpose of Honeypot?

A
  • only entice, not entrap
  • attackers shouldn’t be able to download items with enticement
  • allowing to download a fake payroll file would be entrapment, which has different implications with law enforcement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What’s the goal of Honeypot?

A

distract attackers from real assets and isolate in a padded cell until they can be tracked down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What’s Zigbee?

A

low-power, low-data-rate wireless communication standard designed for applications in home automation, industrial automation, and sensor networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What are the frequency bands of Zigbee?

A

2.4 GHz or sub-GHz frequency bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What are the priorities of Zigbee?

A
  1. efficient energy consumption
  2. long battery life
  3. device interoperability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are Zigbee security risks?

A
  • weak encryption or insecure key management
  • unauthorized device pairing
  • network vulnerabilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What does Li-Fi stand for?

A

Light Fidelity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What does Li-Fi use to transmit data?

A
  • visible light or infrared signals
  • leverages light-emitting diodes (LEDs) to transmit data by modulating the light intensity at high speeds
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What are advantages of Li-Fi?

A
  1. high data rates
  2. increased security
  3. resistance to electromagnetic interference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What are disadvantages of Li-Fi?

A
  1. limited range
  2. requires a direct line of sight (cannot penetrate walls)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are the main advantages of satellite communication?

A
  1. communication over long distances
  2. enables connectivity in areas where traditional terrestrial networks may not be available or practical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the download speed range for 5G?

A

gigabits per second (Gbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the latency range for 5G?

A

single-digit milliseconds range

59
Q

What security improvements does 5G offer?

A
  1. stronger encryption algorithms
  2. secure authentication protocols
  3. network segment isolation
60
Q

What happens when a user requests content from CDN?

A
  1. CDN’s edge server determines the closest PoP to the user and delivers the content from that location
  2. the content may be cached at the edge server, or if it’s not available, the edge server retrieves it from the origin server and caches it for future requests
61
Q

What’s CDN?

A

geographically distributed network of servers and data centers that work together to deliver content efficiently over the internet

62
Q

What’s hosted CDN?

A
  • type of CDN service that is provided and managed by a third-party company or service provider
  • content provider (such as a website owner) contracts with a CDN provider to use their distributed network of servers to store and deliver content on their behalf
  • CDN provider takes care of managing the infrastructure, network, and delivery mechanisms, allowing the content provider to offload the burden of content distribution and delivery from their own origin serve
63
Q

Name some companies that provide hosted CDN services

A
  • CloudFlare
  • CloudFront
  • Akama’s Edge
64
Q

What are the 7 types of CDN?

A
  1. Private CDN
  2. Peer-to-Peer CDN (P2P CDN)
  3. Telco CDN
  4. Hybrid CDN
  5. Software-Defined CDN (SD-CDN)
  6. Transparent CDN
65
Q

Describe Private CDN

A

dedicated content delivery network that is exclusively owned and operated by a single organization

66
Q

Describe Peer-to-Peer CDN (P2P CDN)

A
  • utilize the combined resources of users’ devices (peers) to distribute and deliver content
  • when a user requests content, the CDN software on their device fetches the content from both the origin server and other nearby users who have already cached the content
67
Q

Describe Telco CDN

A
  • operated by telcos
  • leverage the telcos’ extensive network infrastructure to cache and deliver content to end-users
68
Q

Describe Hybrid CDN

A
  • combines elements of both private CDNs and hosted CDNs
  • organization may operate its private CDN for specific content and regions while also using a hosted CDN service for additional global coverage or to handle spikes in traffic
69
Q

Describe Software-Defined CDN

A
  • CDNs that utilize software-defined networking (SDN) principles to provide dynamic and flexible content delivery capabilities
  • SD-CDNs can adapt to changing network conditions, traffic patterns, and content availability, optimizing content delivery based on real-time data and analytics
70
Q

Describe Transparent CDN

A
  • integrated with a website or application at the network level, so end-users are unaware that they are accessing content through a CDN
  • ensure that the user experience remains seamless and that the content is delivered efficiently without any visible changes to the URL or browsing experience
71
Q

Describe Wi-Fi Infrastructure Mode

A
  • most common mode of operation in Wi-Fi networks
  • devices connect to a central wireless access point (AP) or router
  • devices do not directly communicate with each other; instead, they send and receive data through the access point
  • typically used in home and enterprise environments where multiple devices need to connect to the same network and access shared resources like the internet or networked printers
72
Q

Describe Wi-Fi Wired Mode

A
  • access point is physically connected to a wired network infrastructure, such as an Ethernet LAN
  • AP uses a wired connection to communicate with the rest of the network and the internet
  • commonly used when the access point is deployed in areas where running Ethernet cables is feasible, such as in office buildings or large homes
73
Q

Describe Wi-Fi Ad hoc Mode

A
  • also known as peer-to-peer mode
  • allows devices to connect directly with each other without the need for a central access point
  • devices create a temporary network on the fly, allowing them to share files, data, or services directly with each other
  • useful in situations where a quick and direct connection between devices is needed, and no centralized infrastructure is available
74
Q

Describe Wi-Fi Standalone Mode

A
  • default operation of an individual wireless access point
  • access point operates independently and is not part of a larger controller-based system
  • functions as a single entity, providing wireless connectivity to connected devices and managing its settings and configurations on its own
  • commonly used in small to medium-sized environments where a single access point can adequately cover the required area
75
Q

What does PAP stand for?

A

Password Authentication Protocol

76
Q

Where is PAP primarly used?

A

Point-to-Point Protocol (PPP) connections

77
Q

Where are Point-to-Point Protocol (PPP) connections commonly employed?

A
  • dial-up connections
  • Virtual Private Networks (VPNs)
  • some types of broadband connections
78
Q

Are credentials protected when being sent in PAP?

A

username and password are sent in cleartext - PAP is considered a weak authentication method from a security perspective

79
Q

What authentication steps are involved in PAP?

A
  1. User Initiation
  2. Username and Password Exchange
  3. Authentication Check
80
Q

What CHAP stand for?

A

Challenge Handshake Authentication Protocol

81
Q

What’s CHAP and where is it used?

A
  • authentication protocol used in Point-to-Point Protocol (PPP) connections
  • commonly used in dial-up connections, Virtual Private Networks (VPNs), and other network scenarios
82
Q

What are the security advantages of CHAP?

A
  • encrypts both username and password
  • performs periodic reauthentication
  • protects against replay attacks
83
Q

What’s the authentication process of CHAP?

A
  • Challenge
    • when a client initiates a connection to a server, the server sends a random challenge value to the client
  • Response
    • client combines the challenge value with its password (or shared secret) and creates a one-way hash
    • hash is sent back to the server as the response
  • Authentication Check
    • server performs the same hash calculation using its copy of the client’s password (or shared secret) and the challenge value
    • calculated hash matches the received response, the authentication is successful, and the server grants access to the client
84
Q

What’s EAP?

A

authentication framework used in computer networks to support various methods for secure authentication between a client and a server

85
Q

Where is EAP commonly used?

A

wireless networks (e.g., Wi-Fi) and Virtual Private Networks (VPNs)

86
Q

Why is EAP known as “extensible”?

A
  • because it allows for the incorporation of different authentication methods, known as EAP methods or EAP types
  • each EAP method defines its specific way of authenticating users, such as using passwords, digital certificates, smart cards, or other authentication mechanisms
87
Q

What’s the EAP authentication process?

A
  • Initiation
    • when a client device tries to connect to a network or server, the EAP process is initiated
  • Method Selection
    • client and server negotiate and agree on the specific EAP method to be used for authentication
  • Authentication Exchange
    • chosen EAP method defines the authentication exchange between the client and server
    • can involve multiple steps, such as the exchange of challenge-response pairs or the use of digital certificates for mutual authentication
  • Authentication Result
    • after the exchange is completed, the server verifies the client’s identity based on the authentication method used
    • if the authentication is successful, the server grants access to the client
88
Q

What’s the purpose of SD-WAN?

A

provide centralized control and management of multiple WAN connections, allowing organizations to dynamically route traffic based on performance, security, and policy requirements

89
Q

What can be used to combine existing networks or to divide a network into multiple segments?

A

Virtual Network

90
Q

What does make firewall design two tier?

A

If it has 2 protected zones (not counting outside zone)

91
Q

What are two primary advantages that 5G networks have over 4G networks?

A
  • enhanced subscriber identity protection
  • mutual authentication capabilities
  • stronger authentication methods and more advanced encryption techniques compared to 4G
92
Q

What layer of SDN implementation uses programs to communicate needs for resources via API?

A

application

93
Q

What are the types of NAC systems in existence (8)?

A
  1. Pre-Admission NAC
  2. Post-Admission NAC
  3. Agent-Based NAC
  4. Agentless NAC
  5. Hybrid NAC
  6. Cloud-based NAC
  7. VLAN-based NAC
  8. Identity-Based NAC
94
Q

How does Pre-Admission NAC assess devices and users?

A
  • before granting access to the network
  • performs checks on the device’s security posture, operating system, antivirus software, and other factors to determine if it meets the organization’s security standards
  • if the device passes the pre-admission checks, it is granted access to the network; otherwise, access is denied or restricted
95
Q

How does Post-Admission NAC assess devices and users?

A
  • grants network access first and then performs security checks after the device is connected
  • if the system detects any non-compliant behavior or security issues during the post-admission check, it may quarantine the device or limit its access until the issues are resolved
96
Q

Explain Agent-Based NAC

A
  • require the installation of software agents on end-user devices
  • help monitor and enforce security policies, report device information to the NAC server, and ensure compliance with network access rules
97
Q

Explain Agentless NAC

A
  • do not require any software installation on end-user devices
  • instead, they rely on various techniques like deep packet inspection, MAC address authentication, and other network-based methods to identify and control devices attempting to connect to the network
98
Q

Explain Hybrid NAC

A
  • combines elements of both agent-based and agentless NAC systems
  • provides flexibility in how devices are managed and secured based on different factors such as device type, location, and user role
99
Q

Explain Cloud-based NAC

A
  • hosted in the cloud and provide access control and security services to remote users and devices
  • often preferred for their scalability, ease of management, and the ability to handle dispersed or mobile workforces
100
Q

Explain VLAN-based NAC

A
  • devices are placed in separate Virtual LANs (VLANs) based on their compliance with security policies
  • non-compliant devices may be placed in restricted VLANs with limited access to resources until they meet the required security standards
101
Q

Explain Identity-Based NAC

A
  • focus on user authentication and apply access controls based on user identities and roles
  • may integrate with directory services such as Active Directory to enforce security policies
102
Q

What’s the main disadvantage of clientless NAC?

A

it cannot check as many things as the client can

103
Q

What does Defense in Depth suggest?

A

using multiple security controls to achieve the same control objective

104
Q

What’s virtual network used for?

A

combine existing networks or to divide network into multiple segments

105
Q

What can happen if a PC is simultaneously connected to a secure and non-secure network like the internet?

A

it may act as a bridge, bypassing security controls located at the edge of the corp network

106
Q

PPTP, L2F, L2TP and IPsec are used for what purpose?

A

VPN

107
Q

What type of protocol is PPP?

A

dial-up

108
Q

How to secure bluetooth?

A

use bluetooth only for activities not confidential, change defult PIN, turn off discovery mode when it’s not active

109
Q

What type of issues can’t a strictly post-admission policy NAC handle?

A

since this doesn’t check the status of a machine before it connects, it can’t prevent the exploit of the system immediately after connection

110
Q

What type of device should be placed between networks, if one supports IPv6 and the other IPv4?

A

gatway

111
Q

What does DCE (system) stand for?

A

Distributed Computing Environment (DCE)

112
Q

What’s DCE system?

A
  • system in which computing resources, such as processing power, storage, and memory, are spread across multiple interconnected computers or nodes
  • the nodes collaborate to perform tasks and solve problems by sharing their resources and working together, often across a network
113
Q

What’s the primary security concern of DCE?

A
  • interconnectedness of the components
  • configuration could allow for error or malware propagation as well - if an adversary compromises one component, it may grant them the ability to compromise other components in the collective through pivoting and lateral movement
114
Q

What is a security risk of an embedded system that is not commonly found in a standard PC?

A

because an embedded system is often in control of a mechanism in the physical world, a security breach could cause harm to people and property (aka cyber-physical)

115
Q

What does RTOS stand for?

A

real-time operating system

116
Q

What are the characteristics of RTOS?

A

minimize latency and delay, store code in ROM, and optimized for mission-critical operations

117
Q

Describe Arduino

A
  • type of microcontroller
  • stores code on a flash chip
  • has a limited C++ based instruction set
  • not suited for mission-critical operations
118
Q

Describe Distributed Control System (DCS)

A
  • open source hardware and software organization that creates single-board 8-bit microcontrollers for building digital devices
  • used to manage small-scale industrial processes
  • can execute C++ programs specifically written to its limited instruction set
  • not designed as a near-real-time solution
  • may be used to manage mission-critical operations
119
Q

Is LEAP example of an actual EAP method?

A

yes

120
Q

Is EAP-VPN example of an actual EAP method?

A

no

121
Q

Is EAP-SIM example of an actual EAP method?

A

yes

122
Q

Is EAP-FAST example of an actual EAP method?

A

yes

123
Q

Is EAP-MBL example of an actual EAP method?

A

no

124
Q

Is EAP-MD5 example of an actual EAP method?

A

yes

125
Q

Is VEAP example of an actual EAP method?

A

no

126
Q

Is EAP-POTP example of an actual EAP method?

A

yes

127
Q

Is EAP-TLS example of an actual EAP method?

A

yes

128
Q

Is EAP-TTLS example of an actual EAP method?

A

yes

129
Q

What does Fog computing rely on?

A

sensors, IoT devices, or even edge computing devices to collect data and then transfer it back to a central location for processing.

130
Q

What are cyber-physical systems?

A

devices that offer a computational means to control something in the physical world

131
Q

How does deduplication work?

A
  • replaces multiple copies of a file with a pointer to one copy
  • if the one remaining file is damaged, then all of the linked copies are damaged or inaccessible as well
132
Q

What are the concerns of when company technicians use 4G/5G during their travels?

A
  • evesdropping
  • rogue towers
  • reliability of establishing a connection
133
Q

What’s nonpersistent system or static system?

A
  • computer system that does not allow, support, or retain changes
  • between uses and/or reboots, the operating environment and installed software are exactly the same
  • changes may be blocked or simply discarded after each system use
  • nonpersistent system is able to maintain its configuration and security in spite of user attempts to implement change
134
Q

What are the potential areas of concern related to third-party connectivity?

A
  • those in which an actual outsider is to be directly connected to on-premises networks; these situations include:
    • business partnerships
    • cloud services
    • telecommuting
135
Q

Can agent-based quarantine noncompliant devices and implement updates automatically?

A

yes

136
Q

Can preadmission-based NAC require a system to meet all current security requirements (such as patch application and malware scanner updates) before it is allowed to communicate with the network?

A

yes

137
Q

Does NAC require the use of IEEE 802.1X?

A

no

138
Q

What can an agentless NAC do to determine whether devices are authorized and baseline compliant?

A

perform port scans, service queries, and vulnerability scans against networked systems to determine whether devices are authorized and baseline compliant

139
Q

Can agentless NAC automatically quarantine and resolve security issues on hosts?

A

no

140
Q

Describe L2F (Layer 2 Forwarding Protocol) protocol

A
  • protocol from Cisco that aimed to tunnel PPP sessions
  • aims to establish a connection-oriented tunnel between the user’s device and the VPN server, allowing PPP frames to be transported securely
  • largely overshadowed by newer and more advanced protocols
141
Q

Describe L2TP (Layer 2 Tunneling Protocol)

A
  • evolution of L2F that combines the best features of L2F and PPTP
  • provides a framework for tunneling various protocols, including PPP
  • used in conjunction with other encryption protocols like IPsec for enhanced security
142
Q

Describe PPTP (Point-to-Point Tunneling Protocol)

A
  • one of the earliest VPN protocols, originally developed by Microsoft
  • simple to set up but not secure due to known vulnerabilities
  • not recommended for secure VPN connections
143
Q

Why is PEAP secure?

A

because it can provide a TLS tunnel that encapsulates EAP methods, protecting the entire session