Security Administration Flashcards

1
Q

Involves sending unsolicited messages to Bluetooth devices when they are in range.

A

bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack that involves getting data from a Bluetooth device

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A rogue wireless access point that mimics the SSID of a legitimate access point

A

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Protocol intended to make a wireless network as secure as wired network. However, it was flawed, and it is now recommended you DON’T use it

A

WEP - Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wifi that uses Temporal Key Integrity Protocol (TKIP), which is a 128-bit per-packet key, meaning that it dynamically generates a new key for each packet.

A

WPA - Wifi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wifi that is based on IEEE 802.11i standard. It provides Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC) - Message Authentication Code (MAC) - Protocol (CCMP) that delivers data confidentiality, data origin authenticaiton, and data integrity for wireless frames.

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In this attack, the attacker sends a deauthenticaiton packet to the wireless access point, spoofing the user’s IP address. This causes the access point to think that the user is logging off and to deauthenticate the user.

A

Disassociation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A radio wave transmission that automatically connects when in range.

A

NFC - Near Field Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of attack that occurs when someone puts up an unauthorized access point.

A

Rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rogue Access point that copies the SSID of a legitimate access point.

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Acronym for satellite communications

A

SATCOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Makes the device only function if it is within certain geographical locations.

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Process intended to be used if the phone is stolen or going to be reassigned to another user

A

Remote Wipe/Sanitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Process that takes into account the context in which the authentication attempt is being made. Examines the user’s location, time of day, the computer from which they are logging in, what they are trying to do, and so on.

A

Context-Aware Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Process to screen lock the screen with a password after a short period of inactivity.

A

Screen Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refers to employees bringing their personal devices into the corporate network environment.

A

BYOD - Bring Your Own Device

17
Q

With this approach, the company creates a list of approved devices that meet the company’s minimum security standards. Employees then can select from among this list of preapproved devices.

A

CYOD - Chose Your Own Device

18
Q

With this approach, the company has complete control of the devices, and thus it can ensure a higher level of security.

A

COPE - Company Owned and Provided Equipment

19
Q

Used to provide a desktop to users on any machines they wish. The desktop itself is actually virtualized, and contains all of the user’s applications. This can also be used by mobile devices.

A

VDI - Virtual Desktop Infraestructure