Domain 2.0 - Security Flashcards

1
Q

What are some built-in security groups for AD?

A

Users, guests, remote management users, event log readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPA2 and CCMP

A

Released in 2004
CCMP block cipher mode (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol or Counter/CMC-MAC Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some CCMP data securities?

A

Data confidentiality with AES encryption.
Message Integrity Check with CBC-MAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are some WPA2 PSK issues?

A

Hash can be captured and then taken offline to be brute forced. Some methods can listen to the four-way handshake and others don’t need the handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does WPA3 change the PSK authentication process?

A

Includes mutual authentication, creates a shared session without sending it across the network, no more four-way handshakes or hashes or brute force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TACAS+?

A

Most recent version of TACAS; created to control access to dial-up lines to ARPANET, TACAS+ has more authentication requests and codes, TACAS stands for Terminal Access Controller Access-Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s Kerberos?

A

Network authentication protocol originally released in the 80’s, mutual authentication with client and server, Microsoft started using Kerberos in Windows 2000 based on Kerberos 5.0 Open Standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some ways to communicate with an authentication server?

A

Often determined by what is at hand.
VPN concentrator can talk to a RADIUS server.
TACAS+ is familiar with Cisco devices.
Kerberos is used in Microsoft heavy networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojan horse is…

A

Malware that pretends to be other software. Doesn’t tend to care to replicate itself, attempts to circumvent security, good ones are built to avoid and disable AV. Once inside it has free reign.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rootkits are…

A

Originally a Unix technique, modifies core system files (even the core), can be invisible to both OS and traditional AV. Specific removers are required for specific rootkits. Secure boot with UEFI helps circumvent rootkits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A virus is…

A

malware that can and looks to reproduce itself, needs to be executed as a program, may or may not cause problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A boot sector virus is…

A

A virus that modifies the boot loader to run malware before the OS loads. UEFI BIOS/ Secure Boot prevents unsigned software from running during the boot process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Spyware is…

A

Malware that spies on you for the purposes of advertising, identity theft, affiliate fraud. Can trick you into installing similar to a trojan horse. Monitors browsing and performs keylogging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware is…

A

malware that encrypts entire PC until you pay the ransomers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Windows Recovery Environment?

A

You have (almost) complete control over the Windows OS, requires a certain level of expertise to use, and is to be used as a last resort. Fix your problems before Windows starts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly