Section 16 Securing Networks Flashcards

1
Q

A user or administrator level account that is installed on a device by the manufacturer during production.

A

Default Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Copper, fiber optic, and coaxial cabling used as the connectivity method in a wired network.

A

Network Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A disturbance that can affect electrical circuits, devices, and cables due to radiation or electromagnetic.

A

Electromagnetic Interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A disturbance that can effect electrical circuits, devices, and cables due to AM/FM transmissions or cell towers.

A

Radio Frequency Interference (RFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Occurs when a signal transmitted on one copper wire creates an undesired effect on another wire.

A

Crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The electromagnetic field generated by a network cable or device when transmitting.

A

Data Emanation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secured system of cable management to ensure that the wired network remains free from eavesdropping, tapping, data emanations, and other threats.

A

Protected Distribution System (PDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uniquely identifies the network and is the name of the WAP used by the clients.

A

Service Set Identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An unauthorized WAP or Wireless Router that allows access to the secure network.

A

Rouge Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A rouge, counterfeit, and unauthorized WAP with the same SSID as your valid one.

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Same encryption key is used by the access point and the client.

A

Pre-Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Original 802.11 wireless security standard that claims to be as secure as a wired network.

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Replacement for WEP which sues TKIP, Message Integrity Check (MIC), and RC4 encryption.

A

WiFi Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

802.11; standard to provide better wireless security featuring AES with a 128 bit key, CCMP, and integrity checking.

A

WiFi Protected Access Version 2 (WPA 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Automated encryption setup for wireless networks at a push of a button, but is severely flawed and vulnerable.

A

WiFi Protected Setup (WPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Intentional radio frequency interference targeting your wireless network to cause a denial of service condition.

A

Jamming

17
Q

Creates network segment for each client when it connects to prevent them from communicating with other clients on the network.

A

AP Isolation

18
Q

Act of searching for wireless networks by driving around until you find them.

A

War Driving

19
Q

Act of physically drawing symbols in public places to denote the open, closed, and protected networks in range.

A

War Chalking

20
Q

Attack that targets an individual client connected to a network, forces it offline by deauthenticating it, and then captures the handshake when it reconnects.

A

WiFi Disassociation Attack

21
Q

Occurs when an attacker continually guesses a password until the correct one is found.

A

Brute Force Attack

22
Q

Uses AES-256 encryption with a SHA-384 hash for integrity checking.

A

WPA3 - Enterprise Mode

23
Q

A secure password-based authentication and password authenticated key agreement method.

A

Simulations Authentication of Equals (SAE)

24
Q

A feature of key agreement protocols (like SAE) that provides assurance that session keys will onto be compromised even if long term secrets used in the session keys exchange are compromised.

A

Froward Secrecy

25
Q

Devices that use a radio frequency signal to transmit identifying information about the device or token holder.

A

Radio Frequency Identification (RFID)

26
Q

Allows two devices to transmit information when they are within close range through automated pairing and transmission.

A

Near Field Communication (NFC)