Lesson 9 - Network Security Capabilities Flashcards

1
Q

NAC

A

Network Access Control
- a security solution that enforces policy on devices seeking to access network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIS

A

Center for Internet Security
- a non-profit organization that develops and promotes cybersecurity best practices, including the CIS Controls framework and CIS Benchmarks, to help organizations strengthen their cybersecurity posture and defend against cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

STIGs

A

Security Technical Implementation Guides
- a configuration standard developed by the Defense Information Systems Agency (DISA) for securing Department of Defense (DoD) systems and networks, providing technical guidance to harden systems and minimize vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DISA

A

Defense Information Systems Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BSSID

A

Basic Service Set Identifier
- a unique MAC address that identifies a Wi-Fi access point or router, allowing devices to distinguish between different APs within a network, and is crucial for network security and troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSID

A

Service Set Identifier
- A character string that identifies a particular wireless LAN (WLAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WPA

A

Wi-Fi Protected Access
- Standards for authenticating and encrypting access to Wi-Fi networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WEP

A

Wired Equivalent Privacy
- A legacy mechanism for encrypting data sent over a wireless connection, replaced by WPA (Wi-Fi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TKIP

A

Temporal Key Integrity Protocol
- The mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WPS

A

Wi-Fi Protected Setup
- A feature of WPA and WPA2 that allows enrollment in a wireless network based on an eight-digit PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DPP

A

Device Provisioning Protocol
- also known as Wi-Fi Easy Connect
- a secure and standardized protocol for configuring Wi-Fi devices, offering a streamlined and user-friendly experience for onboarding IoT devices to a network, replacing older methods like WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WAP

A

Wireless Access Point
- a network device that extends wireless coverage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CCMP

A

Cipher Chaining Message Authentication Code Protocol
- replaces TKIP (Temporal Key Integrity Protocol) in WPA3
- an authenticated encryption algorithm that combines counter mode encryption with CBC-MAC authentication, providing both confidentiality and integrity during data transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RC

A

Rivest Cipher 4
- replaced by AES (Advanced Encryption Standard) in WPA3
- a widely used, but
now considered insecure, stream cipher algorithm that encrypts data byte by byte, known for its speed and simplicity, but vulnerable to attacks due to weaknesses in its key-scheduling algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SAE

A

Simultaneous Authentication of Equals
- Personal authentication mechanism for Wi-Fi networks introduced with WPA3 to address vulnerabilities in the WPA-PSK method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AES GCMP

A

AES Galois Counter Mode Protocol
- replaces AES CCMP in WPA3
- A high performance mode of operation for symmetric encryption. Provides a special characteristic called authenticated encryption with associated data, or AEAD.

17
Q

PSK

A

Pre-Shared Key
- A wireless network authentication mode where a passphrase-based mechanism is used to allow group authentication to a wireless network. The passphrase is used to derive an encryption key.

19
Q

EAP-TTLS

A

Extensible Authentication Protocol - Tunneled Transport Layer Security
- a method that uses a TLS tunnel to protect authentication data, allowing for the use of legacy authentication protocols like PAP or CHAP, while enhancing security against eavesdropping and man-in-the-middle attacks.

20
Q

PEAP

A

Protected Extensible Authentication Protocol
- a cybersecurity protocol that enhances wireless network security by encapsulating the Extensible Authentication Protocol (EAP) within a secure Transport Layer Security (TLS) tunnel, protecting authentication data during transmission.

21
Q

EAPoL

A

EAP over LAN
- A port-based network access control (PNAC) mechanism that allows the use of EAP authentication when a host connects to an Ethernet switch.

22
Q

NAC

A

Network Access Control
- A general term for the collected protocols, policies, and hardware that authenticate and authorize access to a network at the device level.

23
Q

DHCP

A

Dynamic Host Configuration Protocol
- used to dynamically assign Internet Protocol (IP) addresses to each host on your organization’s network.

24
Q

SMTP

A

Simple Mail Transfer Protocol
- the standard protocol for sending emails

25
Q

NBAD

A

Network Behavior and Anomaly Detection
- A security monitoring tool that monitors network packets for anomalous behavior based on known signatures.

26
Q

UEBA

A

User and Entity Behavior Analytics
- a cybersecurity solution that uses machine learning and advanced analytics to detect anomalous user and entity behavior, identifying potential threats like insider attacks and compromised accounts that traditional security tools might miss.

27
Q

NTA

A

Network Traffic Analysis
- involves monitoring and analyzing network traffic to identify suspicious activity, anomalies, and potential threats, enabling proactive threat detection and response.