Supplemental Flashcards

1
Q

when a client sends a request to a WAP, they are added to that devices ___

A

Associated List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the first step in giving 802.11 some security was ___, which uses the ___ encryption protocol

A

Wired Equivalency Privacy (WEP); RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WEP uses encryption keys ___, making it relatively easy to hack

A

that are generated by the WAP and shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the current standard for wireless encryption is ___, also known as ___

A

802.11I, WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11i/WPA2 uses ___ for authentication using a ___ server, and the ___ encryption protocol.

A

802.1x; RADIUS; AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

because much of the hardware couldn’t handle AES encryption when 802.11i was released, the ___ was developed and later named ___

A

Temporal Key Integrity Protocol (TKIP); Wireless Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TKIP/WPA improved the ___ of key generation and WPA2 uses AES encryption via ___

A

initialization vector; CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RADIUS solves the problem of ___, but not ___.

A

authentication; authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RADIUS servers refer to the internet gateway as the ___ and the user trying to authenticate as the ___

A

client; supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RADIUS servers can use any of the following ports:

A

UDP 1812, 1813, 1645, 1646

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Windows networks have two particular authentication protocols, one is ___ in which the client and server both send challenge messages, and the other is ___, in which the Domain Controller acts as a ___

A

NT LAN Manager; Kerberos; Key Distribution Center (KDC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the TKIP increased the key initialization vector from ___ bits to ___

A

24; 48

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UNIX systems use a ___ to protect their hashed password database

A

shadow password file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

in ___ a physical chip installed on a device holds passwords, keys and digital signatures for authentication

A

Trusted Platform Module (TPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bitlocker is an example of built in ___

A

Whole Disk Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the ___ files on a computer cannot be encrypted, making ___ on startup critical

A

boot process; authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___ hashing is commonly used in digital signatures

A

Message Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a ___ attack takes advantage of occasional hashing collisions

A

birthday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

___ hash algorithms were developed by the NSA and are used in PGP, TLS, SSL and IPsec because they are considered more secure than MD5

A

Secure Hash Algorithm (SHA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

unlike AES, DES or Blowfish, ___ is a streaming cipher

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IPsec uses two modes, ___ and ___ mode

A

transport; tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___ is a secure form of Telnet

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

HTTPS is secured with ___

A

either SSL or TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

the easiest disaster recovery exercise is a ___

A

document review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

in a ___ attack, a piece of software is modified to carry malware

A

refactoring

26
Q

___ allows devices to communicate over very short ranges using a chip implanted in the device

A

Near Field Communications (NFC)

27
Q

rejecting a user that is actually authorized is a Type __ error

A

1

28
Q

the main users of an Interconnection Service Agreement (ISA) are ___

A

telecommunications companies

29
Q

SCP and SFTP use ___ for encryption (and Port 22) while FTPS uses ___ for encryption

A

SSH, SSL/TLS

30
Q

the Linux command ___ shows all files and directories, and if used with the switch ___, will show ownership permissions for files

A

ls; -a

31
Q

the Linux command ___ shows all network connections, routing tables and protocol statistics. To find out if your machine is functioning as a server, use the switch ___ and look to see if any of the connections say ___

A

netstat; -a; “listening” in the right-hand column

32
Q

The Linux command Netstat can be used to see who your machine is talking to by shutting down all browsers and using the switch ___

A

-n

33
Q

the Linux command ___ shows all the hops made by a packet to reach its destination. If you can’t reach a website then use this to see if the failure is in the first few hops, meaning the failure is ___

A

tracert; in your network

34
Q

the Linux command ___ will show all devices connected to your network and can be used to determine if a switch is being misused

A

arp

35
Q

the AES encryption standard is also known as ___

A

Rijindael

36
Q

the ___ encryption model uses Web of Trust and a public key

A

PGP

37
Q

Risk Assessment looks at ___ and ___

A

Probability; Impact

38
Q

when Diffie-Hellman uses an elliptical formula it is known as

A

ECDH

39
Q

99.99% availability leaves ___ of down time per year

A

52 minutes

40
Q

EAP-___ uses predetermined symmetric keys for authentication, EAP-___ is able to use TLS with both sides supplying a certificate and EAP-___uses TLS but only the server has a certificate

A

PSK; TLS; TTLS

41
Q

the ___ authentication protocol is rarely used anymore because it passes the username and password as clear text

A

Password Authentication Protocol (PAP)

42
Q

___ is the main Linux utility that is used to troubleshoot DNS issues

A

dig

43
Q

___ encapsulates an EAP connection in an encrypted and authenticated tunnel

A

Protected EAP (PEAP)

44
Q

Microsoft group policy complexity requirement means passwords contain characters from at least ___ different categories

A

3

45
Q

___ is the usual method of valuing assets, which can be derived from the opinions of managers

A

asset classification

46
Q

Containerization is virtualizing the ___

A

Operating System

47
Q

the US Dept of Defense uses a Personal Identity Verification card called a ___

A

Common Access Control (CAC)

48
Q

___ analysis looks at data, but does not identify trends or patterns

A

log

49
Q

The ___ file on a local machine provides for fully qualified domain name (FQDN) resolution in the absence of DNS and can be used to redirect users to the wrong web site.

A

hosts

50
Q

A ___ serves as a centralized authentication point for virtual private network connections.

A

VPN concentrator

51
Q

A ___ attack is a type of ICMP attack where large amounts of ping packets are sent from a spoofed IP address on the network to the network broadcast address, causing many replies back to the victim and possibly bringing about a denial of service.

A

smurf

52
Q

A ___ program opens a back door for the hacker to gain access to the system remotely at a later time

A

RAT

53
Q

A ___ is a group of compromised systems that the hacker has control over and uses to attack a victim’s system.

A

botnet

54
Q

___ is the best choice for preventing cross-site scripting (XSS) attacks on websites

A

input validation

55
Q

A ___ device responds by not doing anything to cause harm when the failure occurs. A ___ device responds by making sure the device is using a secure state when a failure occurs.

A

fail-safe; fail-secure

56
Q

___ uses Microsoft Point-to-Point Encryption (MPPE) protocol to encrypt all traffic from the client to the server.

A

Microsoft CHAP (MS-CHAP)

57
Q

___ indicates how long an asset may be down or offline without seriously impacting the organization.

A

The maximum tolerable downtime (MTD)

58
Q

A minimum password age requires that users must wait a certain amount of time before ___

A

they are allowed to change passwords.

59
Q

___ involves an attacker attempting to take control of or use a Bluetooth-enabled cell phone to place calls.

A

Bluebugging

60
Q

IPSec provides encryption services for ___ when used in a VPN implementation.

A

L2TP

61
Q

A ___ is a unique number assigned to each individual user account on a Windows system

A

security identifier (SID)

62
Q

disaster recovery steps include preparation, ___, ___, ___, ___, reporting

A

Reporting, Detection, analysis, containment, and eradication