Security (V) Flashcards

1
Q

VLAN Hopping

A

*Ability to send traffic from one VLAN into another, bypassing VLAN segmentation
*Sending packets to a port not usually accessible from an end system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP Spoofing

A

Sending falsified ARP Messages over a local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spoofing

A

Occurs when an attacker masquerades as another person by falsifying their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On-Path/Man-in-the-Middle (MITM) Attack

A

Occurs when an attacker puts themselves between the victim and the intended destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Session Hijacking

A

Attacker guesses the session ID in use between a client and server and takes over the authenticated session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DNS Poisoning

A

An attacker manipulates known vulnerabilities within DNS to reroute traffic to a fake version of a site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rogue DHCP Server

A

A DHCP server on a network which is not under the administrative control of the network admins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP SYN Flood

A

Occurs when an attacker initiates multiple TCP sessions, but never completes them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Smurf Attack (ICMP Flood)

A

An attacker sends a ping to a subnet broadcast address with the source IP spoofed to that of the victim server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purging/Sanitizing

A

Removes data which cannot be reconstructed using any known forensic techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Clearing Technique

A

Removes data with a certain amount of assurance that it can’t be reconstructed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access Control Vestibule (Mantrap)

A

An area between two doorways that holds people until they are identified and authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Access Control (NAC)

A

Ensures a device is scanned to determine its current state of security prior to being allowed network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Persistent Agent

A

A piece of software installed on a device requesting access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Non-Persistent Agent

A

Requires the users to connect to the network and go to a web-based captive portal to download an agent onto their devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Zero-Day Vulnerability

A

A new vulnerability that no one knows about yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Common Vulnerabilities and Exposures (CVE)

A

List of known vulnerabilities

18
Q

Posture Assessment

A

Assesses cyber risk posture and exposure to threats cause by misconfigurations and patching delays.

19
Q

Business Risk Assessment

A

Used to identify, understand, and evaluate potential hazards in the workplace

20
Q

Mandatory Access Control (MAC)

A

Access control policy where the computer system gets to decide who gets access to what objects

21
Q

Zero-Trust

A

A security framework that requires users to be authenticated and authorized before being granted access to applications and data.

22
Q

DMZ

A

A perimeter network that protects an organization’s internal local area network from untrusted traffic

23
Q

Screen Subnet

A

Subnet int the network architecture that uses a single firewall with three interfaces to connect three dissimilar networks

24
Q

Dual Control

A

Two people have to be present at the same time to do something

25
Q

Wireless Analyzer

A

Ensures you have the proper coverage and helps prevent overlap between wireless access point coverage zones and channels

26
Q

Protocol Analyzer

A

Used to capture and analyze signals and data traffic over a communication channel

27
Q

Logic Bomb

A

A specific type of malware that is tied to either a logical event or a specific time

28
Q

Firewall Zone

A

Firewall interface in which you can set up rules

Inside
Outside
DMZ

29
Q

Unified Threat Management (UTM) Device

A

Combines firewall, router, intrusion d/p system, anti-malware, and other features into a single device

30
Q

Three methods of intrusion detection

A

Signature-based
Policy-based
Anomaly-based

31
Q

Least Functionality

A

Configuring a device, server, or workstation to only provide essential services required by the user

32
Q

Dynamic ARP Inspection (DAI)

A

*Validates Address Resolution Protocol (ARP) packets
*Helps against ARP Poisoning

33
Q

Stateless Firewall/Packet-Filtering Firewall

A

*L3
*Does not preserve information about the connection
*Each packet is analyzed independently with no record of previously processed packets.
*Requires the least processing effort
*Can be vulnerable to attacks spread over a sequence of packets
*Filter on
-IP (source/dest)
-Protocol ID/type
-Port Number

34
Q

Stateful Inspection Firewalls

A

*L5
*Maintain stateful information about session
*Information is stored in a dynamically updated state table
*Once the connection has been allowed, the firewall allows traffic to pass unmonitored, in order to conserve processing effort.

35
Q

Stateful Firewall

A

Inspects traffic as part of a session and recognizes where the traffic originated

36
Q

NextGen Firewall (NGFW)

A

Third-generation firewall that conducts deep packet inspection and packet filtering

37
Q

What happens when IDS inspects a packet

A
  • Evaluate the entire packet
  • Check all the alert rules
  • Log any matches it finds
  • Allow it to continue onward to its destination.
38
Q

Aplication-aware Firewall

A
  • Make decisions about what applications are allowed or blocked
  • Inspecting the data contained within the packets
39
Q

Kerberos

A
  • Authentication protocol
  • Send data over insecure networks while using strong encryption
40
Q

Network-based anti-malware

A
  • Can be installed as a rack-mounted, in-line network appliance
  • Don’t have to install software on each client.
  • Often come as part of a UTM
41
Q

WAF (Web Application Firewall)

A

Protects web applications by filtering and monitoring HTTP traffic between a web application and the Internet.