Net-Sec Test #3

5.0(2)
studied byStudied by 1 person
5.0(2)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/123

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

124 Terms

1
New cards

on-path attack

occurs when a threat actor positions themselves in the middle between two communicating users or devices

2
New cards

man-in-the-middle (MITM)

a threat actor is positioned into a communication between two parties

3
New cards

Session replay

An attack that involves intercepting and then using a session ID to impersonate a user

4
New cards

Replay attack

makes a copy of a legitimate transmission before sending it to the recipient

5
New cards

man-in-browser (MITB)

attack that intercepts communication between parties to steal or manipulate the data, usually begins with a Trojan infecting the computer and installing an extension into the browser configuration

6
New cards

DNS-based attack

substitutes a DNS address so that the computer is silently redirected to a different device (DNS poisoning and hijacking)

7
New cards

DNS poisoning

modifies a local host file on a device to point to a different domain

8
New cards

DNS hijacking

intended to infect an external DNS server with IP addresses that point to malicious sites

9
New cards

DDoS (distributed denial of service)

uses hundreds or thousands of devices flooding the server with requests

10
New cards

amplified attacks (reflection attacks)

where threat actors attack a misconfigured Internet device or service in such a way that causes the device or service to reflect and generate an even larger payload at the ultimate target

11
New cards

PowerShell

a task automation and configuration management framework from Microsoft

12
New cards

VBA (visual basic for applications)

An event-driven Microsoft programming language

13
New cards

Macros

are used to automate a complex task or a repeated series of tasks, date back to late 1990s but continue to be a key attack vector

14
New cards

ARP poisoning

relies on MAC spoofing, or initating another computer by means of changing the MAC address

15
New cards

MAC cloning

threat actors discover a valid MAC address of a device connected to a switch and spoof the MAC address on their own device and the switch changes its MAC address table to reflect the MAC address with the port to which the attacker's device is connected

16
New cards

MAC flooding attack

a threat actor overflows the switch with Ethernet packets that have been spoofed so that every packet contains a different source MAC address

17
New cards

Yua has discovered that the network switch is broadcasting all packets to all devices. She suspects it is the result of an attack that has overflowed the switch MAC address table. Which type of attack would she report?
A. MAC spoofing attack
B. MAC cloning attack
C. MAC flooding attack
D. MAC overflow attack

C. MAC flooding attack

18
New cards

Anomaly monitoring

designed for detecting statistical anomalies, a secure baseline of normal activities is compiled so if there is a deviation from the baseline, an alarm is raised

19
New cards

Signature-based monitoring

examines network traffic, activity, transactions, or behavior to look for well-known patterns to compare these activities against a predefined signature

20
New cards

Behavior-based monitoring

uses the normal processes and actions as the standard, continuously analyzes the behavior of processes and programs on a system and alerts the user if it detects any abnormal actions

21
New cards

Heuristic monitoring

is founded on experience-based techniques and attempts to answer the question will this do something harmful if it is allowed to execute

22
New cards

Wireshark

a popular GUI packet capture and analysis tool

23
New cards

Tcpdump

a command-line packet analyzer

24
New cards

Tcpreplay

a tool for editing packets and then replaying the packets back onto the network to observe their behavior

25
New cards

Flow analysis

the process of monitoring the network's devices and sounding an alert if it exceeds a baseline

26
New cards

NetFlow

a session sampling protocol that collects IP network traffic

27
New cards

DLP (data loss prevention)

A system of security tools used to recognize and identify data that is critical to the organization and ensure it is protected. Designed to detect and prevent unauthorized data from leaving or internal misuse, e.g. copying data to usb.

28
New cards

SNMP (simple network management protocol)

is used to remotely monitor, manage, and configure devices on the network

29
New cards

Log aggregation

enables security personnel to gather events from disparate sources into a single entity so that it can be searched and analyzed

30
New cards

SCAP (security content automation protocols)

can help automate vulnerability management and determine whether the enterprise is compliant with required policies

31
New cards

SEIM (security information and event management)

consolidates real-time security monitoring and management of security information with analysis and reporting of security events

32
New cards

SOAR (security orchestration, automation, and response)

is similar to a SIEM in that it is designed to help security teams manage and respond to a high number of security warnings and alarms and takes it a step further by combining more comprehensive data gathering and analytics in order to automate incident response

33
New cards

Which type of monitoring methodology looks for statistical deviations from a baseline?
A. Behavioral monitoring
B. Signature-based monitoring
C. Anomaly monitoring
D. Heuristic monitoring

C. Anomaly monitoring

34
New cards

MUA (mail user agent)

is what is used to read and send emails from an endpoint

35
New cards

MTA (mail transfer agent)

programs that accept email messages from senders and router them toward their recipients

36
New cards

SPF (sender policy framework)

An email authentication method that identifies the MTA email servers that have been authorized to send email for a domain

37
New cards

DKIM (domain keys identified mail)

An authentication technique that validates the content of the email message

38
New cards

DMARC (domain-based message authentication, reporting, and conformance)

allows the administrative owner of a domain to publish a policy in their DNS records to specify which mechanism (DKIM, SPF, or both) is used when sending email from that domain

39
New cards

SEG (secure email gateway)

acts as a "proxy" for the organization's email server

40
New cards

Which of the following email defenses uses a digital signature?
A. SPC
B. DKIM
C. DMARC
D. It depends on whether or not the email payload has been encrypted.

B. DKIM

41
New cards

antispoofing

a defense routers have that protect against devices that imitate another computer's IP address

42
New cards

firewall

uses bidirectional inspection to examine outgoing and incoming packets, rule-based is specific and policy-based is more generic

43
New cards

forward proxy

a computer or an application that intercepts user requests from the internal secure network and processes the requests on behalf of the user

44
New cards

reverse proxy

router requests coming from an external network to the correct internal server

45
New cards

honeypot

a computer located in an area with limited security that serves as bait to threat actors either low or high interaction

46
New cards

honeynet

a network or honeypots set up with intentional vulnerabilities

47
New cards

sinkhole

a bottomless pit designed to steer unwanted traffic away from its intended destination to another device

48
New cards

passive system

is connected to a port on a switch, which receives a copy of network traffic

49
New cards

port mirroring (SPAN)

mirrors traffic to a designated port (monitors)

50
New cards

Network TAP

full unaltered copy of net traffic (placed in-line)

51
New cards

Maya is researching information on firewalls. She needs a firewall that allows for more generic statements instead of creating specific rules. What type of firewall should Maya consider purchasing that supports her need?
A. Content/URL filtering firewall
B. Policy-based firewall
C. Hardware firewall
D. Proprietary firewall

B. Policy-based firewall

52
New cards

Web filtering

monitors the websites users are browsing so that the organization can either allow or block web traffic to protect against potential threats and enforce corporate policies

53
New cards

DNS filtering

blocks harmful or inappropriate content, blocks entire domains

54
New cards

Which of the following is NOT a common network device that can be configured to provide a degree of security protection?
A. Router
B. Switch
C. Endpoint
D. Server

C. Endpoint

55
New cards

air-gapped network

The most restricted level of all can be a network that has physical isolation from all other networks or the Internet

56
New cards

Logical segmentation

creates subnets via virtual networks or through network addressing schemes

57
New cards

DMZ

functions as a separate network that rests outside the secure network perimeter

58
New cards

jump server

a minimally configured server within the DMZ that runs only essential protocols and ports

59
New cards

Remote access VPN

allows users to connect to the network from anywhere

60
New cards

Site-to-site VPN

connects networks together over the public internet

61
New cards

NAC (Network access control)

examines the current state of an endpoint before it can connect to a network

62
New cards

Bluetooth

a wireless technology that uses short-range radio frequency (RF) transmissions for communications over short distances, primary type of topology is piconet

63
New cards

Bluejacking

an attack that sends unsolicited messages to Bluetooth-enabled devices

64
New cards

Bluesnarfing

an attack that accesses unauthorized information from a wireless device through a Bluetooth connection

65
New cards

NFC (Near field communication)

A set of standards used to establish communication between devices in close proximity, passive NFC device only contains information, active can read and transmit data

66
New cards

RFID (Radio frequency identification)

is commonly used to transmit information between employee identification badges, inventory tags, book labels, and other paper-based tags that can be detected by a proximity reader

67
New cards

AP (access point)

a centrally located WLAN connection device that can send and receive wireless signals

68
New cards

Controller APs

can be managed through a dedicated wireless LAN controller (WLC)

69
New cards

captive portal AP

uses a standard web browser to provide information and allows the user to agree to a policy or present valid login credentials

70
New cards

hard edge

a well-defined boundary protects data and resources

71
New cards

blurred edge

caused by the introduction of WLANs, multiple entry points

72
New cards

rogue AP

an unauthorized AP that allows an attacker to bypass many of the network security configurations, usually set up by an insider

73
New cards

evil twin

an AP set up by an attacker, attempts to mimic an authorized AP

74
New cards

RF jamming

occurs when attackers use intentional RF interference to flood the RF spectrum with enough interference to prevent a device from communicating with the AP

75
New cards

disassociation attack

An attacker can create false deauthentication or disassociation management frames that appear to come from another device, causing the client to disconnect from the AP

76
New cards

Muchaneta is investigating a security incident in which the smartphone of the CEO was compromised and confidential data was stolen. She suspects that it was an attack that used Bluetooth. Which attack would this be?
A. Blueswiping
B. Bluehiking
C. Bluejacking
D. Bluesnarfing

D. Bluesnarfing

77
New cards

WEP (Wired Equivalent Privacy)

An IEEE 802.11 security protocol designed to ensure only authorized parties can view transmissions by encrypting them with a shared secret key between the wireless client device and the AP

78
New cards

WPS (Wi-Fi protected setup)

protected setup through pin or push-button method

79
New cards

WPA (Wi-Fi protected access)

was introduced by the wifi alliance to fit into the existing WEP engine without requiring extensive hardware upgrades or replacements, WPA uses TKIP and WPA2 uses AES, which is more secure

80
New cards

SAE (simultaneous authentication of equals)

included by WPA3, is designed to increase security at the time of hanshake when keys are being exchanged

81
New cards

site survey

an in-depth examination and analysis of a wireless LAN site

82
New cards

public cloud

a cloud where the services and infrastructure are offered to all users with access provided remotely through the Internet

83
New cards

community cloud

a cloud that is open only to specific organizations that have common concerns

84
New cards

private cloud

a cloud that is created and maintained on a private network

85
New cards

hybrid cloud

a combination of public and private clouds

86
New cards

SaaS

the vendor provides access to the vendor's software applications running on a cloud infrastructure

87
New cards

PaaS

consumers install and run their own specialized applications on the cloud computing network

88
New cards

IaaS

the vendor allows customers to deploy and run their own software, including OSs and applications

89
New cards

XaaS

a broad category of subscription services related to cloud computing

90
New cards

Arsene has been given a project to manage the development of a new company app. He wants to use a cloud model to facilitate the development and deployment. Which cloud model should he likely choose?
A. SaaS
B. XaaS
C. IaaS
D. PaaS

D. PaaS

91
New cards

vulnerability scan

an ongoing automated process used to identify weaknesses and monitor information security progress

92
New cards

Threat intelligence

data that is collected, processed, and analyzed to understand a threat actor's motives, targets, and attack behaviors

93
New cards

3 web levels

clear web, deep web, dark web

94
New cards

Active scanning

sends test traffic transmissions into the network and monitors the responses of the endpoints

95
New cards

Passive scanning

does not send any transmissions but instead only listens for normal traffic to learn the needed information

96
New cards

internal vulnerability scan

is performed from the vantage point inside the internal network, benefit of identifying at-risk systems

97
New cards

external vulnerability scan

is performed from the vantage outside the network

98
New cards

risk appetite

the organization's tolerance for exposure to a vulnerability

99
New cards

scope of a vulnerability scan

the target devices to be scanned

100
New cards

sensitivity level

the depth of a scan