Network Security 9 Flashcards

1
Q

In ad-hoc mode, all wireless communication is performed in a peer-to-peer fashion and does not require or involve a WAP.

A

ad-hoc mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

security standard was designed to fit that exact situation. It provides network access control at the port level, whether physical or wireless, and it provides an authentication standard based on the Extensible Authentication Protocol (EAP). Authentication is typically done via a username and password, but you can also configure it to use public key infrastructure (PKI) certificates. The authorization policies used in 802.1x systems can also check the version of antivirus or malware scanners on a computer. If the user’s device does not conform to the corporate standard, the network administrator may configure the policy to permit limited network access, such as access to a server to update the antivirus software.

A

802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Deauthentication (abbreviated deauth) is a denial-of-service (DoS) attack where the attacker can force any client (or even every client) off of the network. Worse yet, the attacker does not even need to be on the network they are attacking. That is right, the attacker can kick anyone off the network without even joining that wireless network. why? : To force users to reconnect and have them connect to the attacker’s access point instead (2) To capture the 4-way handshake of WPA to gain intelligence that allows the attacker to hack into the WAP to gain access to the corporate network.

A

Deauth Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

an attacker sets up an illegitimate wireless network using their own WAP and may even share their own cellular data to create an internet hotspot. The attacker usually opens this network without any security or authentication so as to entice people in a hurry to connect to the attacker’s rogue WAP.

A

Fake Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

authentication, in which you confirm the user is who they claim to be, (2) authorization, where you define what that user is able to access (3) accounting : account for and report on the access that a user has been granted, including how often the user accesses the resource or data and people who dont have unauthorized access.

A

AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

remove unnecessary accounts, change default password, change password every 30-90 days, remove unnecessary services, keep patches up to date, limit physical access to device, allow changes only from a trusted network, check audit logs for activity, backup …

A

hardening the security of a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

______________ as a service means that the customer is responsible for all software and data beyond the hypervisor. The cloud service provide is responsible for the hypervisor and all hardware in the system.

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

network administrators began using proxy servers that could act as a middleman, reading and parsing the traffic payload, and then forwarding it on to the intended destination if the payload was safe. This behavior was later incorporated into firewalls to provide a deeper level of inspection, can read and inspect packets.

A

proxy servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ delivers a framework for developers that they can build upon and use to create customized applications. All servers, storage, and networking can be managed by the enterprise or a third-party provider while the developers can maintain management of the applications.

A

PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is fully self-service for accessing and monitoring computers, networking, storage, and other services. ____ allows businesses to purchase resources on-demand and as-needed instead of having to buy hardware outright. Clients retain complete control of their infrastructure.

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ refers to the highly-individualized, responsive, data-driven products and offerings that are fully controlled by customers—and the data they provide via everyday IoT-powered sources like cell phones and thermostats.

A

XaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly