Sec + Flashcards

Study for the Sec+ certification

1
Q

Wi-Fi Protected Setup

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPS

A

Wi-Fi Protected Setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PIN recovery

A

Wi-Fi Protected Setup (WPS) exploit?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wi-Fi Protected Setup (WPS) exploit?

A

PIN recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPS PIN feature, which most recent models have enabled by ________

A

default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPS PIN feature

A

This flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network’s WPA/WPA2 pre-shared key.[2] Users have been urged to turn off the WPS PIN feature,[3] although this may not be possible on some router models.[4]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_________ a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. It may be used by attackers to bypass access controls such as the same-origin policy.

A

Cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for __________.

A

IP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Radio-frequency identification (______) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically-stored information. Passive tags collect energy from a nearby ______ reader’s interrogating radio waves.

A

RFID

RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RFID

A

Radio-frequency identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wi-Fi Protected Setup

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WPS

A

Wi-Fi Protected Setup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

contents of a rainbow table entry

A

Hash/Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EOL

A

End of Life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

POODLE (Padding Oracle on Downgraded Legacy Encryption)

A

cryptographic downgrade attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

three authentication protocols that offer countermeasures against replay attacks?

A

IPsec
Kerberos
CHAP

17
Q
Which of the following cryptographic hash functions is the least vulnerable to attacks?
   SHA-1
   RIPEMD	
   SHA-512	
   MD5
A

SHA-512

18
Q

Active reconnaissance techniques

A

port scanning….. (add to later)

19
Q

Applies to a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports? IEEE 802.___?

A

IEEE 802.1X

20
Q

forward proxy

A

Acts on behalf of a client

Hides the identity of a client

21
Q

reverse proxy

A

Acts on behalf of a server

Hides the identity of a server

22
Q

A common example of channel overlapping in wireless networking could be the 2.4 GHz band used in 802.11 networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (_____________) allows multiple networks to coexist in the same area without causing interference.

A

1, 6, and 11 in this case

23
Q

The underlying principles of every ________ system is to aggregate relevant data from multiple sources, identify deviations from the norm and take appropriate action. For example, when a potential issue is detected, a _________ might log additional information, generate an alert and instruct other security controls to stop an activity’s progress.

A

SIEM

SIEM

24
Q

Write once read many (__________) describes a data storage device in which information, once written, cannot be modified.

A

WORM

25
Q

Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can ____________.

A

transfer

26
Q

Data loss prevention

A

(DLP)

27
Q

(DLP)

A

Data loss prevention (DLP)

28
Q

TLS is a cryptographic protocol that provides end-to-end communications security

A

Transport Level Security

29
Q

The Rogue AP Detection page displays information about all access points detected by the AP541N in the vicinity of the _________.

A

network

30
Q

Rogue AP Detection page

A

displays information about all access points detected by the AP541N in the vicinity of the network.

31
Q

Which are two that refer to the implementations of NAC?

A

MAC filter

802.1X

32
Q

DLP

A

Data loss prevention software detects potential data breaches/data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in-use, in-motion, and at-rest.

33
Q

Transport Layer Security, and its now-deprecated predecessor, Secure Sockets Layer, are _____
________ designed to provide communications security over a computer network. Several versions of the protocols find widespread use in applications such as web browsing, email, instant messaging, and voice over IP.

A

cryptographic protocols

34
Q

TLS

A

Transport Layer Security

35
Q

SSL

A

Secure Sockets Layer