13 - Security Services Flashcards

1
Q

What is a Whaling attack?

A

A Phishing attack targeting high-profile individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Pharming attack?

A

Pharming is a form of cyberattack that sends you to a fake website that looks like the real thing. The user will type in a legitimate web address and is redirected to a fake website that resembles the real website.

Once on the fake site hackers will either attempt to gain access to personal/financial information, or they will use the fake site to infect your computer with viruses, malware, or other malicious software.

Sometimes this is done by having you attempt to login or input information. Therefore, be very cautious of where you are entering personal information and make sure that you aren’t being deceived.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Watering hole attack?

A

A watering hole attack is a form of cyberattack that targets groups of users by infecting websites that they commonly visit. This watering hole definition takes its name from animal predators that lurk by watering holes waiting for an opportunity to attack prey when their guard is down. Likewise, watering hole attackers lurk on niche websites waiting for a chance to infect websites, and in turn, infect their victims with malware.

A watering hole attack differs from phishing and spear-phishing attacks, which typically attempt to steal data or install malware onto users’ devices but are often equally targeted, effective, and challenging to prevent. Instead, a watering hole attack aims to infect users’ computers then gain access to a connected corporate network. Cyber criminals use this attack vector to steal personal information, banking details, and intellectual property, as well as gain unauthorized access to sensitive corporate systems.

Watering hole attacks are relatively rare, but they continue to have a high success rate. That is because they target legitimate websites that cannot be blacklisted, and cyber criminals deploy zero-day exploits that antivirus detectors and scanners will not pick up. Therefore, watering hole attacks are a significant threat to organizations and users that do not follow security best practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a AAA server?

A

An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.

Authentication is the process of identifying an individual, usually based on a username and password. Authentication is based on the idea that each individual user will have unique information that sets him or her apart from other users.

Authorization is the process of granting or denying a user access to network resources once the user has been authenticated through the username and password. The amount of information and the amount of services the user has access to depend on the user’s authorization level.

Accounting is the process of keeping track of a user’s activity while accessing the network resources, including the amount of time spent in the network, the services accessed while there and the amount of data transferred during the session. Accounting data is used for trend analysis, capacity planning, billing, auditing and cost allocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Cisco ISE?

A

Identity Services Engine

Platform that Cisco implements its AAA services in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is TACAS+?

A

TACACS+ (Terminal Access Controller Access-Control System) is a AAA protocol that is developed by Cisco. After a while TACACS+ has became a standard protocol that is supported by all vendors. There is also another standard protocol called RADIUS. If you would like to learn more on RADIUS, you can check RADIUS Protocol lesson. You can also reach related rfc, here.

The main duty of TACACS+ is providing device administration. It can also used for netwok access. With this AAA Protocol, network administrators are authenticated to log in the network devices like router, switches, firewalls, etc. in the network.

AAA Protocols can encrypt the full packet or only the passwords. Here,TACACS+ provides a full packet encryption. It encrypts the whole packet. But RADIUS do not encrypt the full packet. It encrypts only passwords, not the full packets. This makes Terminal Access Controller Access-Control System more secure AAA Protocol than RADIUS Protocol.

TACACS+ is also a Client/Server protocol. For different duties (Authenticaiton , Authorization, Accounting), different messages are used between Server and Client. One side is the Client side and the other is the Server side. The messaging between these two end build the session.

TACACS+ uses TCP (Transmission Control Protocol) as a Trasnport Protocol. The TCP Port that is used for this protocol is 49.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What port does TACAS+ communicate over?

A

Encrypted over TCP port 49

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is RADIUS?

A

Remote Authentication Dial-In User Service, or RADIUS, is a client-server protocol that secures the connection between users and clients and ensures that only approved users can access the network. It is a networking protocol that offers users a centralized means of authentication and authorization.

Standards based protocols that combines Authentication and Authorization into a single resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What port does RADIUS communicate over?

A

UDP ports 1812 and 1813(accounting)

Not completely encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a NAD?

A

Network Access Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What device usually is considered a NAD/NAS?

A

A Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a switch usually referred to in the AAA client role?

A

A NAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What 3 basic elements should an effective security program have?

A
  • User awareness
  • User training
  • Physical access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the issue with some older style IOS passwords?

A

They create a security exposure because the passwords existed in the configuration file as clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the command to encrypt passwords normally stored as clear text?

A

Global command:

service password-encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does IOS add in front of passwords in the config file to signify they are encrypted?

A

7

17
Q

True/False: The no service password-encryption command immediately decrypt stored passwords that are encrypted

A

False

18
Q

True/False: The password encryption service on IOS is not strong

A

True

19
Q

Why is the enable secret command the preferred way for storing passwords?

A

It stores them as a hash rather than weak encryption

20
Q

How can you use a different algorithm type for the enable secret command?

A

enable algorithm-type {sha256 | scrypt } secret test123

21
Q

True/False: You can configure both username test password test and username test secret test commands at the same time just like enable secret and enable password

A

False

22
Q

What sub-command do you use on a vty line to enable an ACL on it?

A

access-class 3 in

23
Q

What is the Cisco ASA?

A

Adaptive Security Appliance (Firewall)

24
Q

What are firewall security zones used for?

A

Defining which hosts can initiate new connections from one zone to another

25
Q

What type of IPS mostly applies logic based on signatures?

A

Traditional IPS

26
Q

What do next generation firewalls do differently?

A

Look at the application layer data to identify the application instead of relying on port numbers. Essentially deep packet inspection

27
Q

What is AVC?

A

Application Visibility and Control (Deep packet inspection)

28
Q

What are 3 key problems with traditional IPS systems?

A
  • IPS compares whole signature database to all messages
  • Generates too many events
  • Staff must figure out which events are useful
29
Q

How does a NGIPS improve on IPS?

A

Examines the context by gathering data from all hosts and their users in order to make more intelligent choices

30
Q

What are the Syslog Severity events?

A

Every Alert Child Enters With No Inhibition’s or Doubts.

0 Emergency
1 Alert
2 Critical
3 Error
4 Warning
5 Notice
6 Information
7 Debug