GCGA Ch. 4 Securing Your Network Flashcards

1
Q

IDS

A

intrusion detection system - inspects network traffic in order to detect malicious activity or policy violations; out-of-band, passive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPS

A

intrusion prevention system - monitors network traffic and takes automated actions to prevent threats, such as blocking or terminating connections. Placed in-line (in-band) with traffic & can stop attacks before they reach internal network; can actively monitor data streams, detect malicious content, and prevent it from reaching a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HIDS vs NIDS

A

can detect attacks on local systems such as workstations and servers. The HIDS monitors local resources on the host and can detect some malware that isn’t detected by traditional antivirus software. A network-based IDS (NIDS) detects attacks on networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Signature-based IDS or IPS

A

uses signatures to detect known attacks or vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Trend-based IDS

A

(also called anomaly-based IDSs) require a baseline and detect attacks based on anomalies or when traffic is outside expected boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SCADA network

A

Supervisory Control And Data Acquisition - an architecture that enables industrial organizations to manage, monitor, and control processes, machines, and plants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Honeypots & honeynets

A

appear to have valuable data and attempt to divert attackers away from live networks. Security personnel use them to deceive attackers, disrupt attacks, and observe attackers’ current attack methodologies. A honeyfile is a file designed to attract the attention of an attacker. Honeytokens are fake records inserted into databases to detect data theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless AP

A

Wireless access points (APs) connect wireless clients to a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSID

A

The service set identifier (SSID) is the name of the wireless network. Disabling the SSID broadcast hides a wireless network from casual users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MAC filtering

A

you can restrict access to wireless networks with media access control (MAC) filtering. However, attackers can discover authorized MACs and spoof an authorized MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Site survey

A

examines the wireless environment to identify potential problem areas. Wireless footprinting uses a heat map to give you a detailed diagram of wireless access points, hotspots, and dead spots within an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wi-Fi analyzers

A

show signal levels on individual wireless frequency channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WPA2

A

Wifi Protected Access 2 - uses AES with CCMP and supports open, pre-shared key (PSK), and Enterprise modes. Enterprise mode is more secure than Personal mode because it adds authentication. It uses an 802.1X authentication server implemented as a RADIUS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPA3

A

Wifi Protected Access 3 - uses Simultaneous Authentication of Equals (SAE) instead of the PSK. WPA3 supports Enterprise mode, similar to WPA2 Enterprise mode. Open mode doesn’t use a PSK or an 802.1X server. Many hotspots use Open mode when providing free wireless access to customers. WPA3 offers a secure open mode that uses encryption, while earlier protocols offer insecure open modes that are subject to eavesdropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.1X servers’ EAP versions

A

use one of the Extensible Authentication Protocol (EAP) versions, such as Protected EAP (PEAP), EAP-Tunneled TLS (EAP-TTLS), EAP-TLS, or EAP-Flexible Authentication via Secure Tunneling (EAP- FAST). The most secure EAP method is EAP-TLS, and it requires a certificate on the server and on each of the clients. PEAP and EAP-TTLS require a certificate on the server, but not the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.1X server authentication

A

provides strong port security using portbased authentication. It prevents rogue devices from connecting to a network by ensuring only authorized clients can connect.

17
Q

Captive portal

A

forces wireless clients to complete a process, such as acknowledging a policy or paying for access, before it grants them access to the network.

18
Q

Disassociation attack

A

effectively removes a wireless client from a wireless network, forcing the wireless client to reauthenticate.

19
Q

WPS

A

Wi-Fi Protected Setup - allows users to easily configure a wireless device by pressing a button or entering a short PIN. WPS is not secure with WPA2. A WPS attack can discover the PIN within hours. It then uses the PIN to discover the passphrase. However, WPA3 thwarts WPS attacks.

20
Q

Rogue AP

A

A rogue access point (rogue AP) is an AP placed within a network without official authorization. An evil twin is a rogue access point with the same or similar SSID as a legitimate access point.

21
Q

Jamming attack

A

floods a wireless frequency with noise, blocking wireless traffic.

22
Q

IV attack

A

An initialization vector (IV) attack attempts to discover the IV and uses it to discover the passphrase. Near field communication (NFC) attacks use an NFC reader to read data from mobile devices.

23
Q

RFID attack

A

Radio-frequency identification (RFID) attacks include eavesdropping, replay, and DoS.

24
Q

Bluejacking

A

the practice of sending unsolicited messages to a phone. Bluesnarfing is the unauthorized access to or theft of information from a Bluetooth device. Placing devices into conductive metal lockboxes that act as a Faraday cage will block Bluetooth attacks.

25
Wireless replay attack
an attacker captures data sent between two entities, modifies it, and then impersonates one of the parties by replaying the data. WPA2 and WPA3 are resistant to wireless replay attacks.
26
VPN
Virtual private network - provides access to private networks via a public network, such as the Internet. IPsec is a common tunneling protocol used with VPNs, and it secures traffic within a tunnel. IPsec provides authentication and integrity with an Authentication Header (AH). Encapsulating Security Payload (ESP) encrypts VPN traffic and provides confidentiality, integrity, and authentication.
27
IPsec Tunnel mode
encrypts the entire IP packet used in the internal network. Ipsec Transport mode only encrypts the payload and is commonly used in private networks, but not with VPNs. A full tunnel encrypts all traffic after a user has connected to a VPN. A split tunnel only encrypts traffic destined for the VPN’s private network.
28
Site-to-site VPNs
provide secure access between two networks. These can be on-demand VPNs or always- on VPNs. Mobile devices can also use always-on VPNs to protect traffic when users connect to public hotspots. Other protocols used with VPNs include TLS, L2TP, and HTML5.
29
NAC
Network access control (NAC) inspects clients for specific health conditions such as up-to-date antivirus software, and can redirect unhealthy clients to a remediation network. A permanent NAC agent (sometimes called a persistent NAC agent) is installed on the client and stays on the client. A dissolvable NAC agent is downloaded and run on the client when the client logs on and is deleted after the session ends.
30
Agentless NAC system
will scan systems remotely instead of installing an agent on the system.
31
Remote access authentication
used when a user accesses a private network from a remote location, such as with a VPN connection.
32
PAP
Password Authentication Protocol - uses a password or PIN for authentication. A significant weakness is that PAP sends passwords across a network in cleartext.
33
CHAP
Challenge Handshake Authentication Protocol - more secure than PAP and uses a handshake process when authenticating clients.
34
RADIUS
Remote Authentication Dial-In User Service - provides central authentication for multiple remote access services. RADIUS relies on the use of shared secrets and only encrypts the password during the authentication process, by default. It can be used with EAP to encrypt the entire session.
35
Cisco TACACS+
Terminal Access Controller Access Control System Plus - used as an alternative to RADIUS. TACACS+ uses TCP, encrypts the entire authentication process, and supports multiple challenges and responses.
36
AAA protocols
RADIUS and TACACS+ are authentication, authorization, and accounting (AAA) protocols.