Security Techniques Flashcards

(58 cards)

1
Q

Involves multiple wireless access points working together to create a unified and extended coverage area for users in a large building or facility

A

Extended Service Set Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Occurs when the channels selected for adjacent wireless access points do not have enough space between the channels

A

Adjacent Channel Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Process of planning and designing a wireless network to provide a solution

A

Site Survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Graphical representation of the wireless coverage, the signal strength, and frequency utilization data at different locations on a map

A

Heat Map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Outdated 1999 wireless security standard meant to match wired LAN security for wireless networks

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Introduced in 2003 as a temporary improvement over WEP while the more robust IEEE 802.1 I standard was in development

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Improved data protection and network access control by addressing weaknesses in WPA version

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Latest version using SAE encryption and introducing new features like SAE, Enhanced Open, updated cryptographic protocols, and management protection frames

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enhances security by offering a key establishment protocol to guard against offline dictionary attacks

A

SAE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Major enhancement in wireless security, especially for networks using open authentication.

A

Enhanced Open/Opportunistic Wireless Encryption (OWE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uses a newer variant of AES known as the AES GCMP

A

Cryptographic Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Support 128-bit AES for personal networks and 192-bit AES for enterprise networks with WPA3

A

Galois Counter Mode Protocol (GCMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Required to protect network from key recovery attacks

A

Management Protection Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Plays a vital role in network security by centralizing user authentication to permit only authorized users to access network resources

A

AAA Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Separates the functions of AAA to allow for a more granular control over processes

A

TACACST+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Confirm user identity for network security and authorized access

A

Authentication Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Critical aspect of software development that focuses on building applications that are secure by design

A

Application Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Acts as a gatekeeper to ensure that applications only act on well-designed and uncontaminated data

A

Input Validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

These rules delineate acceptable and unacceptable inputs

A

Validation Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Small pieces of data stored on the user’s computer by the web browser while browsing a website

A

Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Transmitted over secure HTTPS connections to prevent potentials to prevent potential eavesdroppers from intercepting the cookie data

A

Secure Cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A method of debugging an application by reviewing and examining its source code before the program is ever run

A

Static Code Analysis (SAST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Testing method that analyzes an application while it’s running

A

Dynamic Code Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Finds software flaws by bombarding it with random data to trigger crashes and security vulnerabilities

25
Type of software testing that evaluates the stability and reliability of a system under extreme conditions
Stress Testing
26
Technique used to confirm the identity of the software author and guarantee that the code has not been altered or corrupted since it was signed
Code Signing
27
Security mechanism that is used to isolate running programs by limiting the resources they can access and the changes they can make to a system
Sandboxing
28
Scans devices for their security status before granting network access, safeguarding against both known and unknown devices
NAC
29
A software installed on a device requesting network access
Persistent Agent
30
Users connect to Wi-Fi, access a Web portal, and click a link for login in these solutions
Non-Persistent Agent
31
Technique used to restrict or control the content a user can access on the internet
Web Filtering
32
Installing a small piece of software known as an agent on each device that will require web filtering
Agent-based Web Filtering
33
Server that acts as an intermediary between an organization's end users and the internet
Centralized Proxy
34
Used to analyze a website URL to determine if it is safe or not to access
URL Scanning
35
Websites are categorized based on content, like social media, adult content, or gambling, which are frequently restricted in workplaces
Content Categorization
36
Specific guidelines set by an organization to prevent access to certain websites or categories of websites
Block Rules
37
Blocking or allowing websites based on their reputation score
Reputation-based Filtering
38
Technique used to block access to certain websites by preventing the translation of specific domain names to their corresponding IP address
DNS Filtering
39
Allows the receivers to check if the email was actually sent by the domain if claims to be sent from and if the content was tampered with during transit
DomainKeys Identified Mail (DKIM)
40
An email-validation system designed to detect and prevent email spoofing
DMARC
41
Server or system that serves as the entry and exit point for emails
Email Gateway
42
Physical server that is located within an organization's own data center or premises that provides an organization with full control over their email suystem
On-Premise Email Gateway
43
Email gateway that is hosted by third-party cloud service providers to provide greater scalability and ease of maintenance
Cloud-Based Email Gateway
44
Used to combine the benefits of both on-premise and cloud-based gateways into a single offering
Hybrid Email Gateway
45
Process of deleting unwanted and unsolicited emails and preventing them from reaching a user's email inbox
Spam Filtering
46
Category of security tools that monitor endpoint and network events and record the information in a central database
Endpoint Detection and Response (EDR)
47
Used to validate the integrity of OS and application software files using a verification method between the current file state and a known, good baseline
File Integrity Monitoring
48
Security strategy that integrates multiple protection technologies into a single platform to improve detection accuracy and simplify the incident response process
Extended Detection and Response (XDR)
49
Deploys big data and machine learning to analyze user behaviors for detecting security threats
User Behavior Analytics (UBA)
50
Built upon the foundation of UBA with monitoring of entities as an additional function
User and Entity Behavior Analytics (UEBA)
51
Refers to the way data is moved from one place to another, usually using either TCP or UDP to transmit the data
Transport Mode
52
Connection-oriented protocol that ensures data is delivered without any errors
TCP
53
Connection-less protocol that desn't guantee data delivery
UDP
54
Used by system processes or services and consist of ports ranging from port 0 to port 1023
Well-known Ports
55
Used by software applications and utilze a port number between 1024 and 49151
Registered Ports
56
Used for client-side connections that range from port number 49152 to 65535
Dynamic/Private Ports
57
Application layer protocol that allows a user on one computer to log onto another computer that is part of the same network
Telnet
58
Network protocol for securely connecting and communicating with remote devices and systems over an unsecured newtwork
Secure Shell (SSH)