ISC2 - Study Notes 10 Flashcards

1
Q

In some instances, an attacker is able to access a smartphone and issue specific commands to it. This enables the attacker to make phone calls, enable call forwarding, send messages, read and write data, connect to the Internet, and turn on the speaker to eavesdrop on conversations.

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

??? is relatively harmless. It allows users to send unsolicited messages to nearby Bluetooth devices, but it does not involve modifying a phone’s data.

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security VLANs separate traffic from one broadcast domain to another. This is especially useful if sensitive data is transmitted over a network.

Improved performance VLANs reduce the size of broadcast domains and improve their performance because there is less traffic within each broadcast domain.

Reduced costs A VLAN doesn’t require any additional hardware if the switches support VLANs.

A

VLAN Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

can protect VoIP transmissions and provides confidentiality, authentication, and replay protection.

A

SRTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

are placed logically between the user and the Internet. It’s common to place the ??? in the demilitarized zone (DMZ) and configure web browsers to send all web page requests to the Internet via the ???.

A

Proxy servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A packet-filtering firewall uses rules within access control lists (ACLs) to filter the traffic. ACLs filter traffic based on source or destination IP addresses, subnet addresses, entire domains, ports, and/or protocols. The ACLs provide segmentation of a network, by restricting traffic into or out of the network.

A packet-filtering firewall uses an implicit deny philosophy. All traffic is blocked (implicitly denied) unless there is a rule in the ACL that explicitly allows the traffic.

A

Packet-Filtering Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

allows traffic that is part of an active connection or that is initiating a new connection. It rejects traffic that is not part of an active connection or that is not initiating a new connection. It also includes basic packet-filtering capabilities of a packet-filtering firewall.

A

A stateful inspection firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

UTM (NGFW) : malware blocking, spam filtering, URL filtering.

A DMZ is typically created with two firewalls. Using firewalls from two separate vendors provides defense diversity for the DMZ.

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of the primary risks of a remote access server is that anyone with access to a phone or the Internet can try to connect to the server.

A tunneling protocol encapsulates data used on an internal network and transmits it over the public network.

VPN Tunneling Protocol : L2F provides an authentication mechanism, but does not encrypt the traffic.

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A significant weakness of PPTP is that the initial authentication connection is not encrypted. Information in the initial session can include usernames and passwords that can be intercepted by attackers. Even though the passwords are sent in a hashed form instead of in cleartext, attackers can capture them with a sniffer and use the usernames and password information in a replay attack.

L2TP : doesnt itself encrypt traffic but is used w/IPSec for encryption and authentication.

A

Info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly