Section - 21 - Security Techniques Flashcards

1
Q

To find out whether we have proper coverage from WAPs in our enterprise, what do we do?

A

Site Surveys, and we create heat maps, Wireless foot printing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are different wireless security standards ?

A

WEP
WPA - uses TKIP with RC4
WPA2 - uses AES with CCMP
WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define WPA3 protocol.

A

WPA2 uses AES with GCMP. It has many advantages as compared to WPA2.
It is not prone to KRACK attack.

It doesn’t use pre-shared key concept (Prone to Offline-dictionary attack) for authentication. Instead, it uses SAE (Simultaneous Authentication of Equals).

Few other features - Management Frames Protection, Enhanced Open (OWE - Opportunistic Wireless Encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are few terms related to application security?

A
  1. Input validation
  2. Use of Secure cookies and secure attributes for cookies
  3. Sandboxing
  4. Code Signing
  5. Static Code Analysis/ Dynamic Code Analysis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are different kinds of Web-filtering that we can deploy in our networks?

A
  1. Agent-based web filtering
  2. Centralized proxy
  3. URL scanning
  4. Content-categorization
  5. Block sites
  6. Reputation-based filtering

There is DNS filtering as well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are few methods of email security implementation?

A
  1. DKIM - Domain Keys Identity Mail - Organizations use DKIM to protect their domain from BEC (Business Email Compromise.)
    Every email that organization sends, is sent with email signature that validates to recipients that email has come from the same domain and proofs that email hasn’t been spoofed
  2. SPF (Sender Policy Framework) - This method uses IP address to see if the email has come from IPs that are listed in the SPF database for this domain.
    If it came from a different address, it is considered as spam.
  3. DMARC - Domain-based Message Authentication, Reporting and Conformance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is DMARC?

A

DMARC - Domain-based Message Authentication, Reporting and Conformance

It is an email validation system that is designed to detect and prevent email spoofing.

It is a policy set by an organization for recipients that define the criteria that recipient should use to determine if the email is legit or spam.

DEMARC can work with either DKIM, SPF, or both.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Email gateway?

A

It is a server or system that servers as the entry and exit point for emails.
Functions -
- Email routing
- Email Security
- Policy enforcement
- Encryption and Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is EDR, XDR (Extended Detection and Response), UBA (User behavior analytics) and UEBA (User and Entity Behavior Analytics). FIM (File Integrity Monitoring)?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly