CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
Rate it:
Open Preview
33%
Flag icon
A false positive is an alert or alarm on an event that is nonthreatening, benign, or harmless. A false negative is when an attacker is actively attacking the network, but the system does not detect it.
33%
Flag icon
Remember this A false positive incorrectly indicates an attack is occurring when an attack is not active. A high incidence of false positives
33%
Flag icon
increases the administrator’s workload. A false negative is when an attack is occurring, but the system doesn’t detect and report it. Administrators often set the IDS threshold high enough that it minimizes false positives but low enough that it does not allow false negatives.
33%
Flag icon
Intrusion prevention systems (IPSs) are an extension of IDSs.
33%
Flag icon
An IPS is inline with the traffic.
33%
Flag icon
an IDS is out-of-band.
33%
Flag icon
Remember this An IPS can detect, react, and prevent attacks. It is placed inline with the traffic (also known as in-band). An IDS monitors
33%
Flag icon
and responds to an attack. It is not inline but instead collects data passively (also known as out-of-band). As a reminder from the introduction of this section, both IDSs and IPSs have protocol analyzer capabilities. This allows them to monitor data streams looking for malicious behavior. An IPS can inspect packets within these data streams and block malicious packets before they enter the network. In contrast, a NIDS has sensors or data collectors that monitor and report the traffic. An active NIDS can take steps to block an attack, but only after the attack has started. The inline ...more
33%
Flag icon
supervisory control and data acquisition (SCADA)
33%
Flag icon
advanced persistent threats (APTs)
33%
Flag icon
remote access Trojans (RATs)
33%
Flag icon
Remember this An intrusion prevention system (IPS) is a preventive control. It is placed inline with traffic. An IPS can actively monitor data streams, detect malicious content, and stop attacks in progress. It can also be used internally to protect private networks.
33%
Flag icon
Transport Layer Security (TLS) traffic.
33%
Flag icon
Secure Sockets Layer (SSL),
33%
Flag icon
Hypertext Transfer Protocol Secure (HTTPS).
33%
Flag icon
software defined network (SDN) uses virtualization technologies to route traffic instead of using hardware routers and switches.
33%
Flag icon
A honeypot is a sweet-looking server—at
33%
Flag icon
honeynet is a group of honeypots within a separate network or zone, but accessible from an organization’s primary network.
33%
Flag icon
Remember this Honeypots and honeynets attempt to divert attackers from live networks. They give security personnel an opportunity to observe current methodologies used in attacks and gather intelligence on these attacks.
33%
Flag icon
virtual local area network (VLAN).
34%
Flag icon
virtual private network (VPN)
34%
Flag icon
Remember this An 802.1x server provides port-based authentication, ensuring that only authorized clients can connect to a network. It prevents rogue devices from connecting.
34%
Flag icon
A wireless access point (AP) connects wireless clients to a wired network.
34%
Flag icon
Remember this A fat AP is also known as a stand-alone AP and is managed independently. A thin AP is also known as a controller-based AP and is managed by a wireless controller. The wireless controller configures the thin AP.
34%
Flag icon
service set identifier (SSID),
34%
Flag icon
Remember this The service set identifier (SSID) identifies the name of the wireless network. You should change the SSID from the default
34%
Flag icon
name. Disabling SSID broadcast can hide the network from casual users, but an attacker can easily discover it with a wireless sniffer.
34%
Flag icon
media access control (MAC)
34%
Flag icon
the MAC address (also called a physical address or hardware address)
34%
Flag icon
Remember this MAC filtering can restrict access to a wireless network to specific clients. However, an attacker can use a sniffer to discover allowed MAC addresses and circumvent this form of network access control. It’s relatively simple for an attacker to spoof a MAC address.
34%
Flag icon
Remember this You can limit the range of an AP to a room or building by reducing the AP’s power level. This prevents people from connecting because they will be out of the AP’s range.
35%
Flag icon
Wi-Fi Protected Access II (WPA2).
35%
Flag icon
Wired Equivalent Privacy (WEP).
35%
Flag icon
Cipher Block Chaining Message Authentication Code Protocol (CCMP).
35%
Flag icon
Temporal Key Integrity Protocol (TKIP)
35%
Flag icon
Remember this WPA provided an immediate replacement for WEP and originally used TKIP, which was compatible with older hardware. Later implementations support the stronger AES encryption algorithm. WPA2 is the permanent replacement for WEP and WPA. WPA2 supports CCMP (based on AES), which is
35%
Flag icon
much stronger than the older TKIP protocol and CCMP should be used instead of TKIP.
35%
Flag icon
pre-shared key (PSK)
35%
Flag icon
Remember this PSK mode (or WPA-PSK and WPA2-PSK) uses a pre-shared key and does not provide individual authentication. Open mode doesn’t use any security and allows all users to access the AP. Enterprise mode is more secure than Personal mode, and it provides strong authentication. Enterprise mode uses an 802.1x server (implemented as a RADIUS server) to add authentication.
35%
Flag icon
Remember this Enterprise mode requires an 802.1x server. EAP-FAST supports certificates. PEAP and EAP-TTLS require a certificate on the 802.1x server. EAP-TLS also uses TLS, but it requires certificates on both the 802.1x server and each of the clients.
35%
Flag icon
captive portal is a technical solution that forces clients using web browsers to complete a specific process before it allows them access to the network.
35%
Flag icon
disassociation attack effectively removes a wireless client from a wireless network.
35%
Flag icon
Remember this A disassociation attack effectively removes a wireless client from a wireless network, forcing it to reauthenticate. WPS allows users to easily configure a wireless device by entering an eight-digit PIN. A WPS attack guesses all possible PINs until it finds the correct one. It will typically discover the PIN within hours and use it to discover the passphrase.
35%
Flag icon
Wi-Fi Protected Setup (WPS)
35%
Flag icon
A rogue access point (rogue AP) is an AP placed within a network without official authorization.
36%
Flag icon
evil twin is a rogue access point with the same SSID as a legitimate access point.
36%
Flag icon
Remember this Rogue access points are often used to capture and exfiltrate data. An evil twin is a rogue access point using the same SSID as a legitimate access point. A secure AP blocks unauthorized users, but a rogue access point provides access to unauthorized users.
36%
Flag icon
A wireless initialization vector (IV)
36%
Flag icon
Near field communication (NFC) is a group of standards used on mobile devices that allow them to communicate with other mobile devices when they are close to them.
36%
Flag icon
personal area networks (PANs) and within networks.
1 6 16