final review Flashcards

1
Q

Mobile devices

A

requires a non-wired means of connection to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How mobile devices connect to a network?

A

Manageable by the enterprise architecting the connection aspect of the wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cellular

A

Connections use mobile telephony circuits (4G,LTE,3G,5G)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WI-FI

A

Radio communication methods developed under the Wi-Fi alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where do wi-fi systems exist?

A

Exist on 2.4GHz and 5GHz frequency spectrums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bluetooth

A

Short-to-medium-range, low-power wireless protocol that transmits in the 2.4GHz band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless Protocol Bands

Wi-Fi series

A

Most Common, 802.11 Wireless LAN standards certified by Wi-Fi Alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless Protocol Bands

WiMax

A

802.16 wireless network standards ratified by the WiMax Forum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless Protocol Bands
Zigbee

A

Low-Power, personal area network, described by the IEEE 802.15.4 series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access Point

A

AP

Point of entry for radio-based network signals into and out of a network

Can operate in several different modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Service Set Identifier

A

SSID
Name of wireless network
Setting should limit access only to authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fat Access points

A

Standalone access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Thin Access points

A

Controller based Access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Controller Based

A

Controller-based solutions allow for centralized management and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Standalone

A

Standalone points have substantial capabilities with respect to authentication, encryption, and channel management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Signal Strength

A

Wireless signal usability is directly related to signal strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Band Selection/Width

A

Today’s wireless environments employ multiple different bands, each with different bandwidths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Antenna Types and Placement

A

Standard Access point is equipped with an omnidirectional antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can you solve wireless networking problems caused by weak signal strength

A

Weak signal strength can sometimes be solved by installing upgraded-Wi-Fi radio antennas on the access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Power Level Controls

A

Wi-Fi power levels can be controlled by the hardware for a variety of reasons

The lower the power used, the less opportunity for interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does a replay attack occur?

A

A replay attack occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later times.

22
Q

How to prevent a replay attack?

A

The best way to prevent a replay attack is with encryption, cryptographic authentication, and timestamps

23
Q

What is an evil twin?

A

An evil twin attack against the wireless protocol via substitute hardware

24
Q

How does an evil twin attack occur?

A

Uses an access point owned by an attacker that usually has been enhanced to look like a better connection

25
Q

intrusion detection system

A

(IDS) is a security system that detects inappropriate or malicious activity on a computer or network?

26
Q

Foundation for a layered network security approach

A

Starts with a well-secured system

Some of the more complicated and interesting types of network/data security devices are IDSs

27
Q

IDS categories

A

HIDS and NIDS

28
Q

Host-Based IDS

A

Examines activity on an individual system (or host)

Concerned with an individual system

29
Q

Network-based IDS

A

Examines Activity on the Network itself

It has visibility only into the traffic crossing the network link it is monitoring and typically has no idea of what is happening on individual systems

30
Q

IDS Traffic Collector (or sensor)

A

Collects activity/events for the IDS to examine

31
Q

IDS Analysis engine

A

examines collected network traffic and compares it to known patterns of suspicious or malicious activity

32
Q

IDS signature database

A

collection of patterns and definitions of known suspicious or malicious activity

33
Q

IDS user interface and reporting

A

interfaces with the human element and provides alerts when appropriate

34
Q

Network-Based IDSs Components

A

Traffic Collector
Analysis engine
Signature Database
Reports
User interface

35
Q

Advantage of NIDS

A

Providing IDS coverage requires fewer systems

Deployment, maintenance, and upgrade costs are usually lower

A NIDS has visibility into all network traffic and can correlate attacks among multiple systems

36
Q

Disadvantage of NIDS

A

Ineffective when traffic is encrypted

Can’t see traffic that does not cross it

Must be able to handle high volumes of traffic

does not know about the activity on the hosts themselves

37
Q

Advantage of HIDS

A

Very operating system-specific with more detailed signatures

reduce false-positive rates

examine data after it has been decrypted

very application specific

determine whether or not an alarm may impact that specific system

38
Q

Disadvantage of HIDS

A

Must have a process on every system you want to watch

high cost of ownership and maintenance

use local system resources

have a very focused view and cannot relate to activity around them

if logging only locally, could be compromised or disabled

39
Q

Hardening

A

Process of securing and preparing a system for the production environment

40
Q

To try to make systems, servers, workstations, networks, and applications more secure

A

Follow a process of defining their necessary uses and aligning security controls to limit their functionality. This process is called hardening.

Once this is determined, you have a system baseline that you can
compare changes over the course of a system’s lifecycle

41
Q

Operating System

A

(OS) Basic software that handles things such as input, output, display, memory management, and all the other highly detailed tasks

42
Q

Network Operating System

A

NOS

Operating system that includes additional functions and capabilities to assist in connecting computers and devices

43
Q

Protection rings

Devised to deal with security issues associated with

A

Timesharing operations

44
Q

Protection Rings

Enforced by hardware, software, or a combination, and serve to act as a means of

A

Managing privilege in a hierarchical manner

45
Q

Protection Rings

The use of rings separates elements such as applications from directly interfacing with the hardware without going through the

A

OS and, specifically, the security kernel

46
Q

Ring Layers layers from 0-3

A

Kernel, device drivers, device drivers, applications

47
Q

OS Security

A

The operating system itself is the foundation of system security

The security kernel (i.e. reference monitor) is the component of the operating system that enforced OS security policies

48
Q

OS types

A

Network, server, and workstation

Appliance, kiosk, and mobile OS

49
Q

Trusted Operating system

A

Designed to allow multilevel security in its operation

This is further defined by its ability to meet a series of criteria required by the U.S Government

50
Q

Patch Management

A

The process used to maintain systems in an up-to-date fashion

Vendors typically follow a hierarchy for updates
-hotfix
-patch
-service pack

51
Q

Baselining is establishing software’s base state

A

The resulting product is a baseline that describes the capabilities of the software; this is not necessarily secure

52
Q
A