Network Security Flashcards

1
Q

What is TAP

A
  • Terminal access Point: all the traffic flows through this point on the network to monitor the traffic. Read network traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is SPAN

A
  • Switch Port ANalyzer: Switch has port for span and duplicates traffic and sends it out. Port mirroring. Can result in packet loss
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a defensible network

A

a network that can be watched, inventoried, monitored, kept current.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a DoS attack

A

Denial-of-Service. Send lots of requests to a server. The server is overwhelmed with all the noise that it shuts down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are intrusion prevention systems

A

sees problem and makes changes to prevent it. Can be installed on your network to stop people from joining, prevents malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Intrusion Detection Systems

A

monitors your network and tells you when it thinks there is potential malicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Man-in-the-Middle (on path) attacks

A

the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Heartbleed

A

allows an attacker to read more memory from a server than they should be able to, which could potentially reveal sensitive data. Can request lots and lots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are honey pots?

A

Decoy for the hackers. Notifies the company when the honey pot is hacked and helps them know that their system could be in danger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Session Hijacking

A

the attacker takes control of an active communication session between two parties, usually by stealing or guessing a session token or session ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wireless security attacks

A

KRACK, Evil Twins, Rogue Aps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is KRACK?

A

Key Reinstallation Attack
* The flaw in WPA2 occurs because the protocol reinstalls the same encryption key multiple times during the handshake process. An attacker can exploit this by forcing the client and router to reinstall the encryption key, which effectively resets the encryption process, allowing the attacker to intercept and manipulate the data being sent between the devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Evil Twins

A

type of Wi-Fi hacking attack where an attacker sets up a rogue Wi-Fi access point (AP) that masquerades as a legitimate one in order to trick users into connecting to it. Once a device connects to the “evil twin” network, the attacker can intercept, monitor, and potentially manipulate the victim’s internet traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are rogue APs

A

a Wi-Fi access point that has been set up without authorization or approval on a network. Rogue access points can pose a significant security risk because they allow unauthorized users or attackers to potentially gain access to a network and intercept or manipulate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are ARP/DNS spoofing

A

two different types of man-in-the-middle (MITM) attacks that target communication protocols used in networking. These attacks aim to intercept, modify, or redirect network traffic between devices on a local network or the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ARP spoofing

A

a technique where an attacker sends fake ARP messages onto the local network. The goal is to associate the attacker’s MAC address with the IP address of a legitimate device (e.g., the router or another computer on the network). Once the attacker’s MAC address is mapped to a trusted IP address, the attacker can intercept or manipulate traffic meant for that IP

17
Q

What is DNS spoofing

A

Redirects users to malicious websites (e.g., phishing sites or malware distribution sites) by poisoning the DNS records.

18
Q

Cloud security

A

Cloud Access Security B, third party manage cloud security, open buckets (see info people have on the cloud), shared responsibility

19
Q

Some security professionals will deploy an unneeded server into their production environments that purposely includes security vulnerabilities so they can monitor potential attacks. This practice is know as implementing …?

20
Q

The KRACK (Key Reinstallation Attack) vulnerability exploits an issue with the key exchange in which security standard? Which newer standard is not vulnerable (by design) to KRACK?

A

WPA2 is vulnerable to KRACK. WPA3 Fixes it with a new key exchange