Domain 4: Network Security

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/114

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

115 Terms

1
New cards

What is the CIA triad?

Confidentiality (data is private), Integrity (data is accurate), Availability (data is accessible)

2
New cards

What is the AAA framework?

Authentication (who you are), Authorization (what you can do), Accounting (what you did)

3
New cards

What is Type 1 authentication?

Something you know (password, PIN)

4
New cards

What is Type 2 authentication?

Something you have (smart card, token, phone)

5
New cards

What is Type 3 authentication?

Something you are (biometric - fingerprint, retina)

6
New cards

What is Type 4 authentication?

Somewhere you are (location-based, geofencing)

7
New cards

What is Type 5 authentication?

Something you do (behavioral patterns, typing rhythm)

8
New cards

What is MFA (Multi-Factor Authentication)?

Uses two or more different authentication factors (not two passwords)

9
New cards

What is 802.1X?

Port-based network access control for wired and wireless networks

10
New cards

What are the three components of 802.1X?

Supplicant (client), Authenticator (switch/AP), Authentication Server (RADIUS)

11
New cards

What is PEAP?

Protected EAP - uses TLS tunnel for authentication

12
New cards

What is EAP-TLS?

EAP using certificates (most secure but complex)

13
New cards

What is EAP-TTLS?

EAP Tunneled TLS - similar to PEAP

14
New cards

What is EAP-FAST?

Flexible Authentication via Secure Tunneling (Cisco)

15
New cards

What's the difference between RADIUS and TACACS+?

RADIUS: UDP, encrypts password only, combines auth/authorization. TACACS+: TCP, encrypts everything, separates AAA, Cisco proprietary

16
New cards

What ports does RADIUS use?

UDP 1812 (authentication), 1813 (accounting)

17
New cards

What port does TACACS+ use?

TCP 49

18
New cards

What is Kerberos?

Ticket-based authentication protocol using symmetric encryption (port 88)

19
New cards

What are the Kerberos components?

KDC (Key Distribution Center), TGT (Ticket Granting Ticket), TGS (Ticket Granting Service)

20
New cards

What is LDAP?

Lightweight Directory Access Protocol - queries directory services like Active Directory (port 389)

21
New cards

What is LDAPS?

LDAP over SSL/TLS for secure queries (port 636)

22
New cards

What is WEP?

Wired Equivalent Privacy - broken wireless security, never use

23
New cards

What is WPA?

Wi-Fi Protected Access - uses TKIP encryption (legacy, weak)

24
New cards

What is WPA2?

Uses AES encryption with CCMP (secure, current standard)

25
New cards

What is WPA3?

Enhanced security with SAE authentication and forward secrecy (newest, most secure)

26
New cards

What is WPA2 Personal mode?

Uses Pre-Shared Key (PSK) - password-based authentication

27
New cards

What is WPA2 Enterprise mode?

Uses 802.1X with RADIUS server for authentication

28
New cards

What are wireless authentication methods?

Open (no auth), PSK (shared password), Enterprise (802.1X/RADIUS), Captive portal (web login)

29
New cards

What is MAC filtering?

Allows/denies access based on MAC address (weak security, easily spoofed)

30
New cards

What is geofencing?

Virtual perimeter using GPS/RFID that triggers actions when device enters/exits

31
New cards

What is AES?

Advanced Encryption Standard - symmetric encryption (128, 192, 256-bit)

32
New cards

What is DES/3DES?

Legacy encryption algorithms (deprecated, insecure)

33
New cards

What is RSA?

Asymmetric encryption algorithm (public/private key pairs)

34
New cards

What is ECC?

Elliptic Curve Cryptography - asymmetric encryption using smaller keys

35
New cards

What is a site-to-site VPN?

Connects two networks together (typically uses IPSec)

36
New cards

What is a client-to-site VPN?

Remote access VPN for individual users to connect to network

37
New cards

What is a clientless VPN?

Browser-based VPN using SSL/TLS (no software installation needed)

38
New cards

What is IPSec?

Layer 3 VPN protocol with strong security

39
New cards

What are the two IPSec modes?

Transport mode (encrypts payload only), Tunnel mode (encrypts entire packet)

40
New cards

What is SSL/TLS VPN?

Browser-based VPN using port 443 (looks like HTTPS traffic)

41
New cards

What is L2TP?

Layer 2 Tunneling Protocol (usually combined with IPSec for security)

42
New cards

What is PPTP?

Point-to-Point Tunneling Protocol (legacy, insecure, don't use)

43
New cards

What is OpenVPN?

Open-source VPN using SSL/TLS

44
New cards

What is WireGuard?

Modern, lightweight, fast VPN protocol

45
New cards

What does AH do in IPSec?

Authentication Header - provides authentication and integrity (no encryption)

46
New cards

What does ESP do in IPSec?

Encapsulating Security Payload - provides encryption

47
New cards

What is IKE in IPSec?

Internet Key Exchange - negotiates encryption keys

48
New cards

What is an SA in IPSec?

Security Association - defines connection parameters and encryption settings

49
New cards

What is a packet-filtering firewall?

Layer 3/4 basic filtering (stateless)

50
New cards

What is a stateful firewall?

Tracks connection state (smarter than packet-filtering)

51
New cards

What is an application-level firewall?

Layer 7 firewall with deep packet inspection

52
New cards

What is an NGFW?

Next-Generation Firewall with IPS, application awareness, threat intelligence

53
New cards

What is a WAF?

Web Application Firewall - protects web applications from attacks

54
New cards

What is an ACL?

Access Control List - rules that permit/deny traffic based on criteria

55
New cards

How are ACL rules processed?

Top-to-bottom, first match wins, implicit deny at end

56
New cards

What is a standard ACL?

Filters based on source IP address only

57
New cards

What is an extended ACL?

Filters based on source, destination, port, protocol

58
New cards

What are common security zones?

Internal/Private (trusted), DMZ (public servers), External/Public (Internet), Guest (isolated)

59
New cards

What is a DMZ?

Demilitarized Zone - perimeter network for public-facing servers

60
New cards

What is a honeypot?

Decoy system designed to attract and monitor attackers

61
New cards

What happens in shutdown port security mode?

Port disables completely, requires manual re-enable (most secure)

62
New cards

What happens in restrict port security mode?

Drops violating packets, logs event, port stays up

63
New cards

What happens in protect port security mode?

Drops violating packets silently, no log, port stays up

64
New cards

What is a DoS attack?

Denial of Service - attack from single source to overwhelm system

65
New cards

What is a DDoS attack?

Distributed DoS - attack from multiple sources (botnet)

66
New cards

What are common DoS attack types?

SYN flood, UDP flood, ping flood, amplification attacks

67
New cards

What is a man-in-the-middle attack?

Attacker intercepts communication between two parties

68
New cards

What are MitM attack types?

ARP spoofing, DNS spoofing, session hijacking

69
New cards

What is phishing?

Fraudulent emails trying to steal credentials or install malware

70
New cards

What is spear phishing?

Targeted phishing attack against specific person/organization

71
New cards

What is whaling?

Phishing attack targeting executives/high-level targets

72
New cards

What is vishing?

Voice phishing - phone-based social engineering

73
New cards

What is smishing?

SMS phishing - text message-based attacks

74
New cards

What is tailgating?

Following authorized person through secure door without badge

75
New cards

What is shoulder surfing?

Observing someone entering passwords or viewing sensitive info

76
New cards

What is a brute force attack?

Trying all possible password combinations

77
New cards

What is a dictionary attack?

Trying common words and passwords from a list

78
New cards

What is a rainbow table attack?

Using pre-computed hash tables to crack passwords

79
New cards

What is credential stuffing?

Using leaked username/password combinations from breaches

80
New cards

What is password spraying?

Trying common passwords across many user accounts

81
New cards

What is IP spoofing?

Faking the source IP address in packets

82
New cards

What is MAC spoofing?

Changing device MAC address to impersonate another device

83
New cards

What is ARP spoofing?

Sending fake ARP replies to poison ARP cache

84
New cards

What is DNS spoofing/poisoning?

Corrupting DNS cache with false records

85
New cards

What is VLAN hopping?

Attacker gains unauthorized access to other VLANs

86
New cards

What are VLAN hopping methods?

Switch spoofing (mimics trunk), double tagging

87
New cards

How do you prevent VLAN hopping?

Disable unused ports, disable DTP, use native VLAN other than 1

88
New cards

What is a rogue DHCP server?

Unauthorized DHCP server providing false network configuration

89
New cards

How do you prevent rogue DHCP servers?

Enable DHCP snooping on switches

90
New cards

What is an evil twin attack?

Fake wireless AP with legitimate SSID to intercept traffic

91
New cards

What is a deauthentication attack?

Attacker sends deauth frames to disconnect clients from AP

92
New cards

How does WPA3 prevent deauth attacks?

Protected Management Frames (PMF)

93
New cards

What is DNS hijacking?

Redirecting DNS queries to malicious server

94
New cards

What is domain hijacking?

Stealing domain name registration

95
New cards

What is DNS amplification?

DDoS attack using DNS servers to amplify traffic

96
New cards

What is a virus?

Malware that self-replicates and requires host file

97
New cards

What is a worm?

Malware that self-replicates and spreads independently

98
New cards

What is a Trojan?

Malware disguised as legitimate software

99
New cards

What is ransomware?

Encrypts data and demands payment for decryption

100
New cards

What is a rootkit?

Hides malicious activity at system level