1/54
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is LWAPP?
Lightweight Access Point Protocol is what Cisco wireless controllers to communicate with access points.
What is an access point with enough processing logic to function and handle clients without a wireless controller?
Fat AP
What is an access point that requires a wireless controller?
Thin AP
Where does 802.11a work in?
Legacy products working in the 5 GHz band only.
What does coverage mean?
WLAN delivers acceptable data rates to supported devices in all physical locations expected.
What is the importance of disabling SSID?
Prevents any adapters not configured to the specified name from connecting to your network.
What is an issue with NFC?
No encryption, can be intercepted by eavesdropping or M in the M.
What are the 3 physical access controls?
Authentication, Authorization, Accounting
Security Zones: Public
Where guests are invited, deliveries accepted, and so on. Typically high traffic.
What are the 3 alarm systems?
Circuit, Motion Detection, Duress
What are the 3 primary clean agents?
FM-200, FE-13, INERGEN
What is DNS Spoofing?
An attack that compromises the name resolution process.
What does SSL/TLS work as?
Layer between application and transport layers of TCP/IP stack?
How is HTTPS implemented?
A server is assigned a digital cert signed by a trusted CA.
Port for TFTP?
69
What is Real-Time Transport (RTP)?
Stream of media via UDP with reliability features of TCP communication.
What is Point-To-Point Tunneling Protocol (PPTP)?
Provides encryption running on top of PPP. TCP/IP provides transport protocol.
Ports for PPTP?
UDP 1701, control link over 1723
What is L2TP used with?
Usually IPSec, encryption of PPP messages from the start, stronger than PPTP.
What is a Split Tunnel?
Client accesses internet directly using its "native" IP config and DNS servers.
What are the 2 modes for IPSec Transport Mode?
Authentication Header, Encapsulation Security Payload (ESP)
Port for RDP?
TCP 3389
What should the host be configured to never run?
No autorun on USB devices attached
What is a baseline?
A snapshot of typical activity on your network/host.
Difference of Whitelist/Blacklist?
Whitelist: Nothing can run if not on approved whitelist
Blacklist: Anything not on prohibited "blacklist" can run
What are the 3 Main Admin Windows Tools?
Control Panel, Management Consoles, Admin Tools
Describe BYOD
Most popular with employees but poses the most difficulties for security and network managers.
What is Virtual Desktop Infrastructure (VDI)?
Provisioning a workstation OS instance to interchangeable hardware.
What is USB OTG (On The Go)?
Port to function as host or device
What are the 3 components for a Virtual Platform?
Computers, Hyperviser, Guest OS (Virtual Machine)
Describe Cloud Deployment Models: Public
Hosted by 3rd party and shared with other subscribers
What is IaaS (Infrastructure as a Service)?
Provisioning IT resources such as servers, load balancers, and SANs quickly
What is PaaS (Platform as a Service)?
Resources somewhere between SaaS and IaaS. Multi-tier web app/database platform on top.
What is ESI (Electronically Stored Information)?
Latent, meaning evidence cannot be seen with the naked eye. Machine can read it.
Which technology act does the US follow?
Computer Fraud & Abuse Act 1996
What is the first phase of evidence?
Document the scene and collect evidence
What is counterintelligence in terms of cybersecurity?
Gathering info to protect against espionage and hacking
What is the Continuity of Operation Planning (COOP) or Business Continuity Planning (BCP)?
Design systems so they are as little affected by incidents as possible and resources are avail to recover.
What is succession planning?
Targets the specific issue of leadership and senior management.
What is a Tabletop Exercise?
Staff "ghost" disaster, without actually creating one. Doesn't provide evidence on what would actually happen.
What must a complex facility meet?
Must be reconstituted according to a carefully designed order of restoration.
What is a Backout Contingency Plan?
Rolling back OS updates in the event of an issue
3 bullets of non-persistence?
Snapshot/revert to known state, Rollback to known config, Live boot media
4 components of Business Impact Analysis (BIA)?
-Identify critical functions
-Identify assets
-Identify threats
-Access the risk
What is RTO (Recovery Time Objective)?
Period following a disaster that a system may remain offline.
What is MTTF (Mean Time to Failute)/ MTBF (Mean Time Between Failures)?
Represent the expected lifetime of a product or system.
What is MTTR (Mean Time to Repair)?
A measure of time taken to a correct a fault so that the system is restored to full operation.
What is XSRF (Cross-site Request Forgery)?
Exploit applications that use cookies to authenticate users and track sessions.
What is Clickjacking?
User sees and trusts a web app but it is intercepted by an attack who implements a malicious layer.
What is Fuzzing?
Testing an apps input validation routines work well.
What is client-side validation?
Restricted to informing the user that there is some sort of problem with the input before submitting it to the server.
For errors, what is best for an application?
Using custom error handlers so that the developer can choose the amount of info shown when an error is caused.
What is the aim of corporate security policy?`
To obtain support for security awareness in the organization and outline in general terms of risks, guidelines, and responsibilities.
What does hard drive sanitation refer to?
Completely erasing a harddrive.
What does NIST do?
Creates security trainings