2024-05-30T05:57:10+03:00[Europe/Moscow] en true <p><strong>Smart card</strong></p>, <p><strong>RADIUS</strong></p>, <p>Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue</p>, <p>Twofish</p>, <p>Network Access Control</p>, <p>Firewalls and intrusion prevention systems (IPS)</p>, <p>Network segmentation</p>, <p><strong>Banner grabbing</strong></p>, <p>FM-200</p>, <p>Managerial or administrative</p>, <p>Operational controls</p>, <p>Managerial controls</p>, <p>Sender Policy Framework (SPF)</p>, <p>access control list (ACL)</p>, <p>Network Access Control (NAC)</p>, <p>logical techniques</p>, <p><strong>CVE</strong></p>, <p>SIEM</p>, <p>SCADA</p>, <p>protect data stored on a latpop containg company data if it ever got lost</p>, <p>Microsoft's Group Policy Object (GPO)</p>, <p><strong>Smurf attack</strong></p>, <p>SMB service</p>, <p><strong>netstat</strong></p>, <p>ipconfig</p>, <p>tool is used to collect wireless packet data?</p><p></p>, <p><strong>Nessus</strong></p>, <p>Browser redirection usually occurs if this file is modified</p>, <p><strong>Pharming</strong></p>, <p><strong>Retinal scan</strong></p>, <p>analysis framework provides a graphical depiction of the attacker's approach relative to a kill chain</p>, <p>display the IP address and subnet mask for the wired network connection on a macOS or Linux system</p>, <p><strong>Operating System</strong>: Windows</p><p><strong>Purpose</strong>: Provides information about the IP configuration of a machine's network interfaces and allows for limited configuration changes.</p><p></p> flashcards
more terms 5

more terms 5

  • Smart card

    relies upon using a certificate-based authentication mechanism

  • RADIUS

    Captive portals usually rely on 802.1x, and 802.1x uses RADIUS for authentication

  • Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue

    RADIUS

  • Twofish

    classified as symmetric

  • Network Access Control

    prevents unauthorized users from connecting to a network

  • Firewalls and intrusion prevention systems (IPS)

    restrict access from external sources and block known attacks. They would not keep out an intruder who is already in range of the wireless network.

  • Network segmentation

    limit the access that an intruder has to network resources but would not block the connection itself

  • Banner grabbing

    technique used to learn information about a computer system on a network and the services running on its open ports such as software version (Apache 2.0.46) and the type of operating system (Red Hat Linux)

  • FM-200

    fire extinguishing system that is commonly used in data centers and server rooms to protect the servers from fire

  • Managerial or administrative

    determine the way people act

  • Operational controls

    how some thing is accessed or operated

  • Managerial controls

    subject do something because that is the way they were told or ordered to do it

  • Sender Policy Framework (SPF)

    email authentication method designed to detect forging sender addresses during the delivery of the email

  • access control list (ACL)

    type of network traffic filter that can control incoming or outgoing traffic.alone would not have prevented malware was introduced into the company’s network through a remote workstation that was connected to the company’s servers over a VPN connection

  • Network Access Control (NAC)

    computer security that attempts to unify endpoint security technology (such as anti-virus, host intrusion prevention, and vulnerability assessment), the user or system authentication, and network security enforcement.

  • logical techniques

    rather than physical destruction

  • CVE

    standard nomenclature for describing security-related software flaws

  • SIEM

    solution that provides real-time or near-real-time analysis of security alerts generated by network hardware and applications

  • SCADA

    computer-based system for gathering and analyzing real-time data to monitor and control equipment

  • protect data stored on a latpop containg company data if it ever got lost

    Require data at rest encryption on all endpoints

  • Microsoft's Group Policy Object (GPO)

    allows an administrator to create a policy and deploy it across a large number of devices in the domain or network

  • Smurf attack

    occurs when an attacker sends a ping to a subnet broadcast address and devices reply to spoofed IP (victim server), using up bandwidth and processing power. This image is a graphical depiction of this type of attack

  • SMB service

    port 445

  • netstat

    Provides detailed information about network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.

    Common Use Cases:

    View active connections: Lists all active TCP connections and their states.

    Network interface statistics: Displays statistics for network interfaces.

    Routing tables: Shows the routing table information.

    Listening ports: Lists all ports on which the computer is listening.

    Network protocol statistics: Provides statistics for network protocols like TCP, UDP, ICMP, etc.

  • ipconfig

    Purpose: Provides information about the IP configuration of a machine's network interfaces and allows for limited configuration changes.

  • tool is used to collect wireless packet data?

    Aircrack-ng

  • Nessus

    vulnerability scanner

  • Browser redirection usually occurs if this file is modified

    hosts.ini

  • Pharming

    fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one in order to obtain personal information such as user passwords, account numbers, and other confidential data

  • Retinal scan

    biometric authentication factors uses an infrared light that is shone into the eye to identify the pattern of blood vessels

  • analysis framework provides a graphical depiction of the attacker's approach relative to a kill chain

    Diamond Model of Intrusion Analysis

    graphical representation of an attacker's behavior

  • display the IP address and subnet mask for the wired network connection on a macOS or Linux system

    ifconfig

  • Operating System: Windows

    Purpose: Provides information about the IP configuration of a machine's network interfaces and allows for limited configuration changes.

    ipconfig