CompTIA A+ 1102 Network Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Message Integrity Check (acronym)

MIC

2
New cards

Wi-Fi Protected Access II (acronym)

WPA2

3
New cards

Wi-Fi Protected Access III (acronym)

WPA3

4
New cards

Advanced Encryption Standard (acronym)

AES

5
New cards

Galois Message Authentication Code (acronym)

GCMP with GMAC

6
New cards

Counter Mode with Cipher Block Chaining

Message Authentication Code Protocol (acronym)

CCMP with CBC-MAC

7
New cards

Pre-Shared Key (acronym)

PSK

8
New cards

Simultaneous Authentication of Equals (acronym)

SAE

9
New cards

WPA2

- uses CCMP block cipher mode

- provides data confidentiality using AES encryption

- adds a MIC with CBC-MAC (compared to WPA)

10
New cards

WPA3

- introduced in 2018

- uses GCMP block cipher mode

- a stronger encryption method than WPA2

- provides data confidentiality with AES

- includes MIC with GMAC

11
New cards

What is WPA2's biggest security threat?

- PSK brute-force attacks

- hackers can derive the PSK hash and then brute-force the actual PSK.

- once a hacker has the PSK, they also have everyone else's wireless key

- as technology improves, so does the speed of these attacks.

12
New cards

SAE

- built into the WPA3 standard, also an IEEE standard that changed the PSK authentication process

- includes mutual authentication

- creates a shared session key without sending that key across the network

- without a hash, there's no risk of brute-force attacks

- SAE uses a diffie-hellman derived key exchange with an authentication component

- everyone uses a different session key, even with the same PSK

- dragonfly handshake

13
New cards

Wireless Security Modes (list)

- open system

- WPA2/3 - Personal or WPA2/3 - PSK

- everyone uses the same 256-bit key

- WPA2/3 - Enterprise or WPA2/3 - 802.1x

- authenticates users individually with an authentification server

14
New cards

Remote Authentication Dial-In User Service (acronym)

RADIUS

15
New cards

RADIUS

- one of the more common AAA protocols

- supported on a wide variety of platforms and devices

- not just for dial-in

- centralizes authentication for users

16
New cards

Terminal Access Control Access Control System (acronym)

TACACS

17
New cards

Terminal Access Controller Access-Control System Plus (acronym)

TACACS+

18
New cards

TACACS

- remote authentication protocol

- created to control access to dial-up lines to ARPANET

19
New cards

TACACS+

- the latest version of TACACS

- provides more authentication requests and response codes

- released as an open standard in 1993

- commonly associated with Cisco devices, though

20
New cards

Kerberos

- network authentication protocol

- supports SSO

- provides mutual authentication between the client and the server

- prevents against on-path or replay attacks

- standard since the 1980s

- used for Windows Domain authentication

21
New cards

Wireless Evil Twins

- a form of social engineering where an access point is configured to look and act like an existing network

- may overpower the original access point

22
New cards

Denial of Service Attacks

- when an attacker forces a service to fail by overloading the network and systems

- however, a non malicious DoS can occur:

- unintentional DoSing

- for example, a loop on a network could be considered a network DoS

- or, accidentally exceeding allotted bandwidth could be called a DoS

23
New cards

Distributed Denial of Service (acronym)

DDoS

24
New cards

Denial of Service (acronym)

DoS

25
New cards

Distributed Denial of Service Attacks

- attack that uses an army of computers to bring down a service

- the army uses all of the network resources, leaving none for the service to run

- this "army" may be utilizing a botnet

26
New cards

Botnet

- a logical computer network of zombies, controlled by an attacker or attackers.

- often utilized in DoS and DDoS attacks

27
New cards

Mitigating DoS and DDoS Attacks

- stop the traffic at your firewall

- use an ISP that provides anti-DDoS systems and technologies

- use an available third-party Dos/DDoS prevention technology or tool

28
New cards

IP Address Filtering

- content filtering, IP address ranges, or a combination of the two

- has an allow list and a deny list

29
New cards

Content Filtering

- control traffic based on the data within the content

- useful in corporate environments to restrict sensitive data

30
New cards

Static WAN IP

- external IP address

- may be dynamically allocated by the ISP

- may be able to switch to a static IP address for an additional cost

- easier management

31
New cards

Universal Plug and Play (acronym)

UPnP

32
New cards

UPnP

- allows network devices to automatically configure and find other network devices

- applications on the internal network can open inbound ports using UPnP

- no approval is needed

- used for many P2P applications

- best practice would be to disable UPnP

33
New cards

Peer-to-Peer (acronym)

P2P

34
New cards

Screened Subnet

- previously known as the demilitarized zone (DMZ)

- an additional layer of security between the internet and you

- public access to private resources

35
New cards

Port Forwarding

- 24x7 access to a service hosted internally

- external IP/port number maps to an internal IP/port

- does not have to be the same port number

- also called Destination NAT or Static NAT

- does not expire or timeout

36
New cards

Network Address Translation (acronym)

NAT