Smart card
relies upon using a certificate-based authentication mechanism
RADIUS
Captive portals usually rely on 802.1x, and 802.1x uses RADIUS for authentication
Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue
RADIUS
Twofish
classified as symmetric
Network Access Control
prevents unauthorized users from connecting to a network
Firewalls and intrusion prevention systems (IPS)
restrict access from external sources and block known attacks. They would not keep out an intruder who is already in range of the wireless network.
Network segmentation
limit the access that an intruder has to network resources but would not block the connection itself
Banner grabbing
technique used to learn information about a computer system on a network and the services running on its open ports such as software version (Apache 2.0.46) and the type of operating system (Red Hat Linux)
FM-200
fire extinguishing system that is commonly used in data centers and server rooms to protect the servers from fire
Managerial or administrative
determine the way people act
Operational controls
how some thing is accessed or operated
Managerial controls
subject do something because that is the way they were told or ordered to do it
Sender Policy Framework (SPF)
email authentication method designed to detect forging sender addresses during the delivery of the email
access control list (ACL)
type of network traffic filter that can control incoming or outgoing traffic.alone would not have prevented malware was introduced into the company’s network through a remote workstation that was connected to the company’s servers over a VPN connection
Network Access Control (NAC)
computer security that attempts to unify endpoint security technology (such as anti-virus, host intrusion prevention, and vulnerability assessment), the user or system authentication, and network security enforcement.
logical techniques
rather than physical destruction
CVE
standard nomenclature for describing security-related software flaws
SIEM
solution that provides real-time or near-real-time analysis of security alerts generated by network hardware and applications
SCADA
computer-based system for gathering and analyzing real-time data to monitor and control equipment
protect data stored on a latpop containg company data if it ever got lost
Require data at rest encryption on all endpoints
Microsoft's Group Policy Object (GPO)
allows an administrator to create a policy and deploy it across a large number of devices in the domain or network
Smurf attack
occurs when an attacker sends a ping to a subnet broadcast address and devices reply to spoofed IP (victim server), using up bandwidth and processing power. This image is a graphical depiction of this type of attack
SMB service
port 445
netstat
Provides detailed information about network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.
Common Use Cases:
View active connections: Lists all active TCP connections and their states.
Network interface statistics: Displays statistics for network interfaces.
Routing tables: Shows the routing table information.
Listening ports: Lists all ports on which the computer is listening.
Network protocol statistics: Provides statistics for network protocols like TCP, UDP, ICMP, etc.
ipconfig
Purpose: Provides information about the IP configuration of a machine's network interfaces and allows for limited configuration changes.
tool is used to collect wireless packet data?
Aircrack-ng
Nessus
vulnerability scanner
Browser redirection usually occurs if this file is modified
hosts.ini
Pharming
fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one in order to obtain personal information such as user passwords, account numbers, and other confidential data
Retinal scan
biometric authentication factors uses an infrared light that is shone into the eye to identify the pattern of blood vessels
analysis framework provides a graphical depiction of the attacker's approach relative to a kill chain
Diamond Model of Intrusion Analysis
graphical representation of an attacker's behavior
display the IP address and subnet mask for the wired network connection on a macOS or Linux system
ifconfig
Operating System: Windows
Purpose: Provides information about the IP configuration of a machine's network interfaces and allows for limited configuration changes.
ipconfig