Securing Networks Flashcards

1
Q

A user or administrator-level account that is installed on a device by the
manufacturer during production

A

Default Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Occurs when a user is able to gain the rights of another user or
administrator

A

Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

§ A way of bypassing normal authentication in a system

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Copper, fiber optic, and coaxial cabling used as the connectivity method
in a wired network

A

Network Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A disturbance that can affect electrical circuits, devices, and cables due to
radiation or electromagnetic conduction

A

Electromagnetic Interference (EMI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A disturbance that can affect electrical circuits, devices, and cables due to
AM/FM transmissions or cell towers

A

Radio Frequency Interference (RFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Occurs when a signal transmitted on one copper wire creates an
undesired effect on another wire

A

Crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The electromagnetic field generated by a network cable or device when
transmitting

A

Data Emanation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Secured system of cable management to ensure that the wired network
remains free from eavesdropping, tapping, data emanations, and other
threats

A

PRotected Distribution System (PDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Uniquely identifies the network and is the name of the WAP used by the
clients

A

Service Set Identifier (SSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An unauthorized WAP or Wireless Router that allows access to the secure
network

A

Rogue Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A rogue, counterfeit, and unauthorized WAP with the same SSID as your
valid one

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

§ Same encryption key is used by the access point and the client

A

Pre-Shared KEy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Original 802.11 wireless security standard that claims to be as secure as a
wired network

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Replacement for WEP which uses TKIP, Message Integrity Check (MIC),
and RC4 encryption

A

Wifi Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11i standard to provide better wireless security featuring AES with a
128-bit key, CCMP, and integrity checking

A

Wifi Protected Access version 2 (WPA2)

17
Q

Automated encryption setup for wireless networks at a push of a button,
but is severely flawed and vulnerable

A

WiFi Protected Setup (WPS)

18
Q

Intentional radio frequency interference targeting your wireless network
to cause a denial of service condition

A

Jamming

19
Q

Creates network segment for each client when it connects to prevent
them from communicating with other clients on the network

A

AP Isolation

20
Q

Act of searching for wireless networks by driving around until you find
them

A

War Driving

21
Q

Act of physically drawing symbols in public places to denote the open,
closed, and protected networks in range

A

War Chalking

22
Q

Occurs when an attacker observes the operation of a cipher being used
with several different keys and finds a mathematical relationship
between those keys to determine the clear text data

A

IV Attack

23
Q

Attack that targets an individual client connected to a network, forces it
offline by deauthenticating it, and then captures the handshake when it
reconnects

A

WiFi Disassociation Attack

24
Q

Occurs when an attacker continually guesses a password until the correct
one is found

A

Brute Force Attack

25
Q

§ Uses AES-256 encryption with a SHA-384 hash for integrity checking

A

WPA3 Enterprise mode

26
Q

Uses CCMP-128 as the minimum encryption required for secure
connectivity

A

WPA3 Personal mode

27
Q

A secure password-based authentication and password-authenticated
key agreement method

A

Simultaneous Authentication of Equals (SAE)

28
Q

A feature of key agreement protocols (like SAE) that provides assurance
that session keys will not be compromised even if long-term secrets used
in the session key exchange are compromised

A

Perfect Forward Secrecy or Forward Secrecy

29
Q

Sending of unsolicited messages to Bluetooth-enabled devices such as
mobile phones and tablets (sends information)

A

Bluejacking

30
Q

Unauthorized access of information from a wireless device through a
Bluetooth connection (takes information)

A

BLue Snarfing

31
Q

Devices that use a radio frequency signal to transmit identifying
information about the device or token holder

A

Radio Frequency Identification (RFID)

32
Q

Allows two devices to transmit information when they are within close
range through automated pairing and transmission

A

Near Field Communication (NFC)