Securing Networks Flashcards

1
Q

A user or administrator-level account that is installed on a device by the
manufacturer during production

A

Default Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Occurs when a user is able to gain the rights of another user or
administrator

A

Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

§ A way of bypassing normal authentication in a system

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Copper, fiber optic, and coaxial cabling used as the connectivity method
in a wired network

A

Network Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A disturbance that can affect electrical circuits, devices, and cables due to
radiation or electromagnetic conduction

A

Electromagnetic Interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A disturbance that can affect electrical circuits, devices, and cables due to
AM/FM transmissions or cell towers

A

Radio Frequency Interference (RFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Occurs when a signal transmitted on one copper wire creates an
undesired effect on another wire

A

Crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The electromagnetic field generated by a network cable or device when
transmitting

A

Data Emanation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secured system of cable management to ensure that the wired network
remains free from eavesdropping, tapping, data emanations, and other
threats

A

PRotected Distribution System (PDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Uniquely identifies the network and is the name of the WAP used by the
clients

A

Service Set Identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An unauthorized WAP or Wireless Router that allows access to the secure
network

A

Rogue Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A rogue, counterfeit, and unauthorized WAP with the same SSID as your
valid one

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

§ Same encryption key is used by the access point and the client

A

Pre-Shared KEy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Original 802.11 wireless security standard that claims to be as secure as a
wired network

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Replacement for WEP which uses TKIP, Message Integrity Check (MIC),
and RC4 encryption

A

Wifi Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11i standard to provide better wireless security featuring AES with a
128-bit key, CCMP, and integrity checking

A

Wifi Protected Access version 2 (WPA2)

17
Q

Automated encryption setup for wireless networks at a push of a button,
but is severely flawed and vulnerable

A

WiFi Protected Setup (WPS)

18
Q

Intentional radio frequency interference targeting your wireless network
to cause a denial of service condition

19
Q

Creates network segment for each client when it connects to prevent
them from communicating with other clients on the network

A

AP Isolation

20
Q

Act of searching for wireless networks by driving around until you find
them

A

War Driving

21
Q

Act of physically drawing symbols in public places to denote the open,
closed, and protected networks in range

A

War Chalking

22
Q

Occurs when an attacker observes the operation of a cipher being used
with several different keys and finds a mathematical relationship
between those keys to determine the clear text data

23
Q

Attack that targets an individual client connected to a network, forces it
offline by deauthenticating it, and then captures the handshake when it
reconnects

A

WiFi Disassociation Attack

24
Q

Occurs when an attacker continually guesses a password until the correct
one is found

A

Brute Force Attack

25
§ Uses AES-256 encryption with a SHA-384 hash for integrity checking
WPA3 Enterprise mode
26
Uses CCMP-128 as the minimum encryption required for secure connectivity
WPA3 Personal mode
27
A secure password-based authentication and password-authenticated key agreement method
Simultaneous Authentication of Equals (SAE)
28
A feature of key agreement protocols (like SAE) that provides assurance that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised
Perfect Forward Secrecy or Forward Secrecy
29
Sending of unsolicited messages to Bluetooth-enabled devices such as mobile phones and tablets (sends information)
Bluejacking
30
Unauthorized access of information from a wireless device through a Bluetooth connection (takes information)
BLue Snarfing
31
Devices that use a radio frequency signal to transmit identifying information about the device or token holder
Radio Frequency Identification (RFID)
32
Allows two devices to transmit information when they are within close range through automated pairing and transmission
Near Field Communication (NFC)