CSS 211 - Introduction to Network Security
Review for Second Test
The following questions are provided to help you study for the first test. Do not expect to see these exact questions on the test.
- What is the series of IEEE standards that relate to wireless networking called?
- What is the difference between ciphertext and plaintext? Define each of them.
- What are some commonly used 802.11 "alphabetic" standards?
- What are the two methods used in the original 802.11 standard to control access?
- Describe the difference between how Open System authentication works and how Shared Key authentication works.
- What is beaconing? Why could it be considered as a security risk?
- What are two elements that are sent in clear text in an association frame?
- Compare the authentication and encryption methods used in WPA to those used in WEP.
- What does WEP stand for? What does WPA stand for?
- What are the authentication and encryption methods used in WPA2 personal security?
- What are the authentication and encryption methods used in WPA2 enterprise security?
- What normal access point function is moved to switches when using thin access points?
- According to access control terminology, what is each of these things:
- What are some differences between MAC, DAC, and the two versions of RBAC?
- Why would an organization choose to implement separation of duties as a security measure?
- What does the principle of least privilege tell us to do under access control?
- What is the difference between an implicit denial and an explicit denial of a permission?
- Why would an administrator prefer using Group Policies over Access Control Lists? What would be a characteristic of a network that would make this a better choice?
- What are the two types of hashes found in Windows networks for passwords? Which is newer?
- What are some common attack methods regarding passwords? What efficient method uses files found easily on the Internet?
- What are some commonly used restrictions set on passwords to increase security?
- What are three types of locks discussed in the text? What would make each one a preferred choice?
- What does the text tell us about the difference between identification and authentication?
- What does the text tell us about the difference between authorization and access?
- Why is accounting a key element to security?
- What is a one time password (OTP)?
How might you use a one time password that uses a token device?
How might you use a one time password that does not use a token device?
- Give an example of authenticating a user based on something he has, something he knows, and something he is.
What label would be applied to this kind of authentication?
- What are some standard biometric identification methods?
- What examples are given in the text of Federated Identity Management?
- What is a ticket in the Kerberos system?
- What are some differences between DAP and LDAP?
- A RADIUS server would use an Extended Authentication Protocol to manage connections. What are the two examples of an EAP that the text considered safer than the others?
- How is a VPN connection different from other RAS connections?
- The text defines a risk as the likelihood that a threat agent will exploit a vulnerability.
Define each of the terms shown in bold some other way.
- Which of the five management steps determines what the network looks like at the moment, and how much might be lost to an attack?
Which step lists all the information assets of an organization?
Which step calculates the value of a loss?
- In the risk assessment step, we use several financial/accounting type acronyms. Identify each of these.Why might an automated patch update service be useful for a large organization?
Single Loss Expectancy (and how it is calculated)
Annualized Rate of Occurrence
Annualized Loss Expectancy
- What are the three divisions of port addresses?
Which two are managed by IANA?
- What are the three states a port could be in according to the text? What do the states mean about a port?
- What is a scanning tool that could be used to list and locate all the devices attached to a network?
- What is another name for a protocol analyzer?
What is the mode it must place a NIC in to operate?
- What is the name of the reporting standard language developed by DHS for vulnerability reporting?
- What is penetration testing with regard to network security?
- What are some of the log types that are used in Log Management?