Refresher - Section II (Security) Flashcards

1
Q

After switching an office to a Windows domain, trouble when it comes to saving files in redundant network shares showed. Users want to work out of a local Documents folder on their profile, what do you implement to get data to reside on network shares?

A

Folder redirection; it changes the target of a personal folder to a file share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protocol allows access points to use RADIUS or TACACS+ and EAP to tunnel credentials and tokens that allow a domain user to connect via a wireless client to authenticate to a Windows domain controller and use SSO authorization?

A

Kerberos, a SSO authentication and authorization service based on a time sensitive ticket-granting system allows a user account to authenticate to a Windows domain controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard.

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Legacy security algorithm for 802.11 wireless networks and is highly vulnerable to attacks

A

WEP (Wired Equivalent Privacy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a symmetric bit block cipher used for bulk encryption modern security standards WPA2, WPA3, and Transport Layer Security (TLS) which replaced RC4 starting with WPA2

A

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What cipher replaced Rivest Cipher 4 (RC4) at the advent of WPA2?

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A medium sized office is growing and x employees need access to the wireless network. Each employee has a domain account and wireless network access account. What protocol would allow users to use one account granting access to the wireless network and the domain?

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is the next generation of wireless data security intended to replace WPA2 by using AES (AES) Galois Counter Mode Protocol (GCMP) mode of operation?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does Cipher Block Chaining Message Authentication Code Protocol (CCMP) replace?

A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What would provide a stronger encryption to secure a home office, with AES and CCMP?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A secure AAA protocol for authenticating and administrating all company Cisco routers, switches, and access points?

A

TACACAS+ (Terminal Access Controller Access Control System Plus) developed by Cisco to authenticate to administrator accounts for network appliance management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AAA protocol used to mange remote and wireless authentication infrastructure; used mainly for wireless and virtual private network access.

A

RADIUS (Remote Authentication Dial-In User Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Coffe shop provides secure, free Wi-Fi without using a pre-shared passphrase. Which protected access meets this requirement?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protected access was created to fix vulnerabilities in the earlier Wired Equivalency Privacy (WEP) standard.

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Client implements a Windows domain and is building out an AD structure and want to manage access to wireless network using permissions in the new domain. What protocol makes this achievable?

A

EAP; Extensinle Authentication Protocol allows different mechanism to authenticate against a network directory and would be the foundation of managing Wi-Fi access based on Active Directory user objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Implementing a strong EAP-TLS method using MFA in an enterprise environment; must configure the RADIUS server and the wireless supplicant with…

A
  • Digital certificate
  • Encryption key pair
17
Q

Provide seven-step procedure for malware removal.

A

IQ πŸ€“ (identify & quarantine)

DR πŸ‘¨πŸ»β€βš•οΈπŸ‘©πŸ»β€βš•οΈ(disable sys restore, remediate sys)

SEE πŸ‘€ (sched scans, enable sys restore, educate)

OR:

  1. Investigate and verify malware symptoms. 2. Quarantine infected systems. 3. Disable System Restore in Windows. 4. Remediate infected systems: a) Update anti-malware software. b) Scanning and removal techniques (e.g., safe mode, preinstallation environment). 5. Schedule scans and run updates. 6. Enable System Restore and create a restore point in Windows. 7. Educate the end user.
18
Q

Trojan malware removed; what operating system specific validations would ensure no reinfection can occur?

A
  • Verify DNS Configuration correct
  • Software Firewall Settings are On
  • Restore Point Creation & Backup
19
Q

User computer has infection making it unusable at boot up. Support technician gives user a .iso file to help remove the infection Hiw would this file help?

A

Allows user to scan the computer in recovery mode using WinPE to run commands from a clean environment.