Implementation Flashcards

1
Q

WPS

A

WPS was created to ease the setup and configuration of new wireless devices by allowing the router to automatically configure them after a short 8-digit pin was entered.

WPS is vulnerable to a brute-force attack and is easily compromised. WPS should be disabled on all wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EAP

Extensible Authentication Protocol

A

A framework in a series of protocols that allows for numerous diferent mechanisms of authentication, including things like simple passwords, digital certificates, and public key infastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Kerberos

A

Remember! Kerberos is all about ‘tickets’!

Kerberos uses a system of tickets to allow nodes to communicate over a non-secure network and scurely prove their identity

Kerberos is a computer network authentication protocol that works based on tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What provides the best protection against both SQL injection and cross-site scripting attacks?

A

Input Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MECM

Microsoft Endpoint Configuration Manager

A

provides remote control, patch management, software distribution, operating system deployment, network access protection and hardware and software inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wild Card Certificate

A

Is a public-key certificate that can be used with multiple subdomains of a domain

this saves money and reduces the management burden of managing multiple certificates, one for each subdomain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which access control models is the most flexible and allows the resource owner to control the access permission?

A

Discretionary access control (DAC)

  • stresses the importance of the owner
  • the original creator of the resource is considered the owner an can then assign permission and ownership to others
  • the owner has full control over the resource and can modify its ACL to grant rights to others
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hardening

A

the process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions; in principle, a single-function system is more secure than a multipurpose one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Aircrack-ng

A

Aircrack-ng is a complete suite of wireless security assessment and exploitation tools that inclues monitoring, attacking, testing, and cracking of wireless networks

includes packet capture and export of the data collected as a text file or pcap file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Jumpbox

A

a system on a network used to access and manage devices in a separate security zone

it is a hardened and monitored device that spans two dissimiliar security zones and provides a controlled means of access between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WEP, WPA, WPA2, WPA3

A

Wired equivalent privacy (WEP) is an older mechanism for encrypting data sent over a wireless connection

Least secure to most secure:
WEP < WPA < WPA2 <WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

LDAP

Lightweight Directory Access Control

A

uses a client-server model for mutual authentication

used to enable access to a directory of resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SAML

Security Assertions Markup Language

A

an XML-based framework for exchanging security-related information such as user authentication, entitlement, and attributes

often used in conjunction with SOAP

solution for providing SSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CE

Cryptographic Erase

A

in CE, the storage media is encrypted by default

the encryption key itself is destroyed during the erasing operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Zero-fill

A

a prcoess that fills the entire storage device with zeroes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which port should you block at the firewall if you want to prevent a remote login to a server from occurring?

A

22 (SSH)

SSH is the protocol used for remote administration and file copying using TCP port 22

16
Q

Which of the following ports should you block at the firewall if you to prevent a remote login to a server from occuring?

A

22 (SSH)

SSH is the protocol used for remote administration and file copying using TCP port 22

17
Q

IPsec

A

IPsec is the most secure protocol that works with VPNs

18
Q

John the Ripper

A

password cracking software tool

19
Q

Nessus

A

vulnerability scanner

20
Q

Netcat

A

used to create a reverse shell from a victimized machine back to an attacker

21
Q

TPM

Trusted Platform Module

A

a hardware-based cryptographics processing component that is apart of the motherboard

22
Q

HSM

Hardware Security Module

A

used for encryption during secure login and authentication processes

also used for digital signing of data and payment secruity systems

preferred when performance is a priority

23
Q

Difference between:

HSM vs. TPM

A

HSM is an external or additional device added to the system

24
Q

SNMP

Simple Network Management Protocol

A

a TCP/IP protocol that aids in monitoring network-attached devices and computers

25
Q

SAN Certificate

Subject Alternte Name

A

allows multiple hostnames to be protected by the same certificate

26
Q

Stateful Firewall

A

examines the content and context of each packet it encounters

a stateful packet inspection (SPI) firewall understands the preceding packets that came from the same IP address, and thus the context of the communications

27
Q

Split Horizon DNS

A

uses different internal and external DNS servers to provide potentially different DNS responses to users of those networks

deploys distinct DNS servers for two or more environments, ensuring that those environments receive NDS information appropriate to the NDS view that their clients should receive

28
Q

Tokenization

A

used to protect data by substituting tokens for sensitive data without changing the length or data type

29
Q

FDE

Full-disk encryption

A

fully encrypts the hard drive on a computer

effective method for ensuring the security of data on a computer

30
Q

Captive Portals

A

usually rely on 802.1x and 802.1x uses RADIUS for authentication