SecurityTechniques Flashcards

1
Q

Extended Server Set (ESS)

A

Configuration involves multiple wireless access points working together to create a unified and extended coverage area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless Interference Types

A

Co-channel, Adjacent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Co-Channel

A

Is two on the same channel frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adjacent

A

Is two or more different frequencies but the range collides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Site Survey

A

Process of planning and designing a wireless network to provide a solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Heatmap

A

Graphical representation of the wireless coverage, signal strength, frequency utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wired Equivalent Privacy (WEP)

A

Outdated 1999 wireless security standard meant to match LAN security for wireless network. They use the same encryption key for all devices on the network to secure messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wi-Fi Protected Access 2 (WPA2)

A

Improved data protection and network access control by addressing weaknesses in the WPA version; Use AES-CCMP to improve it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wi-Fi Protected Access (WPA)

A

Created as a temporary improvement to WEP using TKIP protocol for a random key for each device instead of a fixed one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wi-Fi Protected Access 3 (WPA3)

A

Latest version of WPA using AES, SAE, enhanced open, better protocols and management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Simultaneous Authentication of Equals (SAE)

A

Enhanced security by offering a key established protocol to guard against offline dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Enhanced Open/ Opportunistic Wireless Encryption (OWE)

A

Major advancement in wireless security, especially for networks using open authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AES CCMP was replaced from WAP2 to use __ in WPA3

A

AES-GCNP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Galoris Counter Protocol (GCNP)

A

Supports 128-bit AES for personal networks and 192-bit AES for enterprise networks with WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Management Frame Protection

A

Required to Protect Networks from Key Recovery Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WPA3 uses AAA techniques such as

A

Remote Authentication Dial-In User Service (RADIUS) for Client-Server Protocols and Terminal Access Controller Access-Control Plus (TACACS+) to allow separate control in the AAA types also using TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Application Security

A

Software development focused on building applications that are secure by design

18
Q

Application Security Types

A

Input Validation, Secure Cookies, Static Code Analysis, Dynamic Code Analysis, Code Signing and Sandboxing

19
Q

Static Code Analysis (SAST)

A

Method for debugging an application by reviewing and examining its source code before the program is ever ran

20
Q

Dynamic Code Analysis Types

A

Fuzzing, Stress Testing

21
Q

Fuzzing

A

Finding software flaws by bombarding it with random data to trigger crashes and security vulnerabilities

22
Q

Code Signing

A

Used to confirm the identity of a software and integrity via digital signatures

23
Q

Network Access Control

A

Scans devices for security status before granting network access, safeguarding against both known and unknown devices

24
Q

Network access Control Types

A

Persistent / NonPersistent

25
Persistent
Needs a software installed under the device requesting network access
26
Non-Persistent
Needs you to sign in once connected to the network, or you receive no network
27
Web Filtering
Technique used to restrict control of the content a user can access on the Internet
28
DNS Filtering
Used to block access to certain websites by preventing the translation of domain names as specific addresses
29
Web Filtering Types
Agent-based, Centralized Proxy, URL scanning, Content Categorization, Block Rules, Reputation-based
30
Agent-Based Filtering
Installing a smallest piece of software known as the agent on each device that requires web filtering
31
Centralized Proxies
Server that acts as a middleman between users and the Internet
32
URL Scanning
Used to analyze a website's URL to determine if it's safe or not to access
33
Content Categorization
Websites are categorized based on the content like social media, adult content, or gambling
34
Block Rules
Specific guidelines set by an organization to prevent access to certain websites or categories of a website
35
Reputation-based Filtering
Blocking or allowing a website is based on the reputation score
36
Email Security Types
DKIM, SPF, DMARC, email gateway protocol, and spam filtering
37
Domain Keys Identified Mail (DKIM)
Allows the receivers to check if the integrity of the data was tampered
38
Sender Policy Framework (SPF)
Authentication method designed to prevent forging senders address during email delivery
39
Domain-based Message Authentication, Reporting, and Conformance (DMARC)
An email validation system designed to detect/prevent email spoofing
40
Endpoint Detection and Response (EDR)
Only endpoints; category of security tools that monitor endpoint and network events and record the info to a database
41
Extended Detection and Response (XDR)
Security strategy that integrates multiple protection strategies into a single platform to improve detection and response rate
42
User Behavior and Analytics (UBA)
Deploys big data and machine learning to analyze user's behavior for detected security threats