4.0 Network Security Flashcards

1
Q

You need to deploy 802.1x authentication that supports client-side digital certificates for authentication with access points. Which technology should you deploy?

A)EAP-TLS
B)Cisco LEAP
C)EAP-PEAP
D)WEP

A

Extensible Authentication Protocol with Transport Layer Security (EAP-TLS) authentication supports client-side digital certificates for authentication with access points. You can configure Cisco Aironet wireless clients with digital certificates for authentication with EAP-TLS authentication. The Cisco EAP-TLS authentication type can be configured on wireless clients that run Windows. If the wireless clients are working with other operating systems, a third-party software package must be installed to support EAP-TLS authentication. The EAP-TLS authentication type operates with a dynamic session-based WEP key. The dynamic session-based WEP key encrypts data with the key that is generated from the RADIUS authentication server or the client adapter. EAP-TLS uses Public Key Infrastructure (PKI) for encryption of data over the RF channel. You integrate the EAP-TLS authentication type with the use of Lightweight Directory Access Protocol (LDAP) for server-based authentication.

For the Network+ exam, you also need to understand Extensible Authentication Protocol − Flexible Authentication via Secure Tunneling (EAP-FAST) and Protected Extensible Authentication Protocol (PEAP). PEAP will form an encrypted TLS tunnel using a certificate on the server. After the tunnel has been formed, PEAP will authenticate the client using EAP within the outer tunnel. EAP-FAST is Cisco’s alternative to PEAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why does Cisco recommend to use Wireless Client Isolation to improve security?

A

In addition to this feature, Cisco has also created and recommends the use of Wireless Client Isolation to improve wireless security. Wireless Client Isolation is a feature that prevents wireless clients from communicating with each other. This feature is useful when configuring a guest network or when utilizing a Bring Your Own Device (BYOD) policy, as it will increase security to limit potential threats from the various connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Does EAP-PEAP work with wireless authentication?

A

EAP-PEAP authentication does not work with wireless access points. EAP-PEAP works with RADIUS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CISCO LEAP Authentications works with?

A

Cisco LEAP authentication does not work with client-side digital certificates. Both sides of the communication using Cisco LEAP share a per-session, per-user encryption key, not a digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What typically enables a social engineering attack to occur? (Choose 2)

A) the deletion of key files
B) believable language
C) encryption
D) gullibility

A

Gullibility, believable language, and the good intentions of users typically enable a social engineering attack to occur. An example of a social engineering attack is an e-mail hoax, which is an e-mail message that indicates the possibility of virus infection. An e-mail hoax contains a message that uses believable language to trick users into believing the hoax. In the text of an e-mail hoax, users are typically instructed to forward the message to as many others as possible, which is how an e-mail hoax replicates. Sometimes, an e-mail hoax will direct users to delete key system files, an action that can seriously damage an operating system installation. Another bomb caused by an e-mail hoax is increased use of bandwidth, which results when users on a network forward a hoax to other users.

Social engineering attacks do not typically use encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which hacker attack can be perpetrated by hijacking a communications session between a Web browser and a Web server?

A) brute force
B) SYN attack
C) MITM
D) Ping of Death

A

A man-in-the-middle (MITM), or an On-Path, attack can be perpetrated by hijacking a communications session between a Web browser and a Web server. When a Web browser submits information to a Web server through a form, a hacker might be able to gain sensitive information, such as credit card numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a brute force Attack?

A

A brute force attack occurs when a hacker tries every possible combination to break a code such as an encryption key or a password. A brute force attack can be used to break into a system that is secured with discretionary access lists (DACs). If a hacker identifies a valid user name and password on a DAC network, then the hacker can log in by using those credentials and can be assigned access to resources based on DAC settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a ping of death?

A

A Ping of Death is a denial-of-service (DoS) attack that occurs when a hacker sends multiple Internet Control Message Protocol (ICMP) messages to a network to attempt to overwhelm servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A SYN attack occurs when?

A

A SYN attack occurs when a hacker exploits the Transmission Control Protocol (TCP) triple handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which aspect of the CIA triad is best described as ensuring that data is accurate and reliable?

A) Authentication
B) Availability
C) Confidentiality
D) Integrity

A

Integrity is best described as ensuring that data is accurate and reliable whenever authorized parties are viewing it. Ensuring integrity guarantees that data has not been altered in any way by a malicious actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe what C is in the CIA triad model?

A

Confidentiality guarantees that only authorized persons can view select data. Maintaining confidentiality is critical because it ensures that proprietary information or corporate secrets are not being exposed to any unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe what A is in the CIA triad model?

A

Availability ensures resources are usable when a user needs them. Maintaining availability refers to having services, applications, or technologies functioning when users need them.

Authentication is not part of the CIA triad. Authentication is the process of verifying a user’s stated identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which attack involves impersonating the identity of another host to gain access to privileged resources that are typically restricted?

A) teardrop
B) spamming
C) spoofing
D) SYN flood

A

In a spoofing attack, which is also referred to as a masquerading attack, a person or program is able to masquerade successfully as another person or program. Spoofing refers to modifying the source IP address field in an IP datagram to imitate the IP address of a packet originating from an authorized source. This results in the target computer communicating with the attacker’s computer and providing access to restricted resources. Basically, the Internet traffic is misdirected because the DNS server is resolving the domain name to an incorrect IP address. A man-in-the-middle attack is an example of a spoofing as well as a session hijacking attack. Other types of spoofing attacks, apart from IP spoofing, are e-mail spoofing and Web spoofing. Spoofing attacks have to do with the misdirection of domain name resolution and Internet traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a teardrop attack?

A

In a teardrop attack, the attacker uses a series of IP fragmented packets, causing the system to either freeze or crash while the packets are being reassembled by the victim host. A teardrop attack is primarily based on the fragmentation implementation of IP. To reassemble the fragments in the original packet at the destination, the host checks the incoming packets to ensure that they belong to the same original packet. The packets are malformed. Therefore, the process of reassembling the packets causes the system to either freeze or crash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a SYN Flood attack?

A

In a SYN flood attack, the attacker floods the target with spoofed IP packets and causes it to either freeze or crash. The Transmission Control Protocol (TCP) uses the synchronize (SYN) and acknowledgment (ACK) packets to establish communication between two host computers. The exchange of the SYN, SYN-ACK, and ACK packets between two host computers is referred to as handshaking. The attackers flood the target computers with a series of SYN packets to which the target host computer replies. The target host computer then allocates resources to establish a connection. Because the IP address is spoofed, the target host computer never receives a valid response in the form of ACK packets from the attacking computer. When the target computer receives many such SYN packets, it runs out of resources to establish a connection with the legitimate users and becomes unreachable for processing of valid requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Spamming attack?

A

A spamming attack involves flooding an e-mail server or specific e-mail addresses repeatedly with identical unwanted e-mails. Spamming is the process of using an electronic communications medium, such as e-mail, to send unsolicited messages to users in bulk. Packet filtering routers typically do not prove helpful in such attacks because the packet filtering routers do not examine the data portion of the packet. E-mail filter programs are now being embedded either in the e-mail client or in the server. E-mail filters can be configured to prevent spamming to a great extent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You are giving a presentation about Internet browsing safety at a senior living center. The residents want to create social media accounts to keep in contact with the grandkids. Which user security concern should you emphasize?

A) Disabling unnecessary services
B) Hashing files
C) Avoiding common passwords
D) Disabling unused ports

A

Avoiding common passwords is critical to establishing basic security. Users should refrain from using dictionary words, names, numbers-only passwords, and keyboard patterns like qwerty. In a recent NIST study, the most secure passwords are comprised of three to four random 10+ character words, such as “ElephantInternationalConstitutionConvention.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How can you secure a switch?

A

Disabling unused ports is an excellent way to secure a switch, not a user account. You should only enable designated active ports needed for network connections. As an example, if you have a 24-port switch, but only 18 of those are needed for connected hosts, you should set the status of the other six ports to “disabled.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can you determine a file has not been altered?

A

File hashing is an excellent security measure to detect whether or not a file has been intercepted and altered, but it will not secure a user account. An algorithm is used to create a unique value (hash) based on the file’s contents. The recipient of the file uses the same algorithm to generate a hash. If the two hash values match, the file has not been altered. Examples of hash algorithms include MD5, SHA1, and CRC32.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does disabling unnecessary services do?

A

Disabling unnecessary services helps reduce the number of potential exploits available to an attacker. By default, Windows starts what are typically unnecessary services during bootup. As an example, you should disable FTP publishing if you do not need FTP service. You can see which services are running by going to Start > Run > Services.msc. However, disabling unnecessary services secures a client computer, not a user account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your company’s IT department needs to provide field engineers with remote GUI-based access to their in-office desktop PCs over the Internet. Engineers could use Windows, Linux, iOS, and Android on their remote devices with a mix of MacOS and Windows on the in-office desktops. Which of the following remote access tools offers the best no-cost option?

A) Telnet
B) VNC
C) RDC
D) ARD
E) SSH

A

Virtual Network Computing (VNC) is correct for many reasons. First, several VNC products are widely and freely available for Windows, OS X (MacOS), Linux, Android, iOS, and Chrome. Second, many VNC products are easy to set up and use, interoperate among multiple versions, and work well through corporate and personal firewalls. Of the items listed it is the best no-cost option.

Apple Remote Desktop is not the best option. It works best for Apple environments, such as OS X and iOS, but it does work on Windows and other platforms as well. However, ARD costs $80 per host license.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Microsoft RDC is it compatible with Linux OS?

A

Microsoft’s Remote Desktop Connection (RDC) is not the best option. It does not work on Linux, but runs in app form on OS X and iOS. It works as a client on all modern Windows versions back to Vista, but as a host only on Pro versions or higher (Enterprise, and Education).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which protocol is NOT capable of preventing a man-in-the-middle attack?

A) HTTPS
B) IPSec
C) SSH
D) rsh

A

The remote shell (rsh) protocol is used to log on to remote computers and can be easily exploited by a man-in-the middle (MITM) attack because it neither provides encryption nor authentication of data. In a MITM attack, an intruder captures the traffic of an established connection to intercept the messages being exchanged between the sender and the receiver. The rsh protocol does not provide security because the traffic flows in clear text and not ciphertext. You can defend against a MITM attack by using strong encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SSH functions?

A

Secure shell (SSH) provides security by authenticating before the exchange of secret keys. SSH is also known as encrypted telnet because it provides encryption of traffic exchanged between the sender and the receiver. Because encryption is used, SSH can prevent MITM attacks better than rsh can.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

To improve your ability to monitor and manage your network devices, your network requirements call for purchasing devices that support out-of-band (OOB) management. Which of the following types of interfaces or devices is most likely to satisfy this requirement, as you select switches, routers, firewalls, and servers for purchase?

A) Serial port
B) Parallel port
C) Separate network interface
D) WAN port
E) RJ-45 port

A

A serial port easily and regularly plays host to a modem, which provides a dial-up link that network admins can use to access the device to which it is attached. The whole idea of OOB is to use a separate communications link outside the scope and reach of the regular network. An out-of-band link provides a way to access a device even when the network is down or when the device needs to be powered up after a power fault or interruption. Console servers may also use special-purpose network console ports to obtain administrative access and control over such devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a physical barrier that acts as the first line of defense against an intruder?

A) a fence
B) a lock
C) a turnstile
D) an access control vestibule

A

Fencing acts as the first line of defense against casual trespassers and potential intruders, but fencing should be complemented with other physical security controls, such as guards and dogs, to maintain the security of the facility. A fence height of 6 to 7 feet is considered ideal for preventing intruders from climbing over the fence. In addition to being a barrier to trespassers, the fence can also control crowds. A fence height of 3 to 4 feet acts as a protection against casual trespassers. For critical areas, the fence should be at least 8 feet high with three strands of barbed wire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the difference between an exploit and a vulnerability?

A) An exploit is a threat, and a vulnerability is a flaw.

B) The two terms are interchangeable

C) An exploit is a flaw, and a vulnerability takes advantage of that flaw

D) A vulnerability is a flaw, and an exploit takes advantage of that flaw

A

When comparing exploits vs. vulnerabilities, a vulnerability is a flaw or weakness, and an exploit takes advantage of that flaw. As examples, a vulnerability could be a section of code in an application that fails to validate user input against a range of acceptable values. The exploit would be the active use of that failure to validate to introduce malicious data, such as an SQL injection attack.

A threat is the likelihood that an event is going to occur.

The terms exploit and vulnerability are not interchangeable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You company want to allow remote users to access their Windows network remotely if their network is not connected to the Internet. Which of the following should you implement?

A) DHCP
B) RAS
C) PPTP
D) SSL

A

Remote Access Service (RAS) is a service provided by Windows that allows remote access to the network via a dial-up connection. In order to obtain a remote connection, two services need to be in place: RAS and dial-up networking (DUN). The server that will establish the remote connection needs to have RAS so that it can link to the remote computer. The remote computer needs to have DUN so that it can connect to the remote server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You are deploying a virtual private network (VPN) for remote users. You want to meet the following goals:

The VPN gateway should require the use of Internet Protocol Security (IPSec).
All remote users must use IPSec to connect to the VPN gateway.
No internal hosts should use IPSec.
Which IPSec mode should you use?

A) gateway-to-gateway
B) This configuration is not possible.
C) host-to-host
D) host-to-gateway

A

You should deploy host-to-gateway IPSec mode. In this configuration, the VPN gateway requires the use of IPSec for all remote clients. The remote clients use IPSec to connect to the VPN gateway. Any communication between the VPN gateway and the internet hosts on behalf of the remote clients does not use IPSec. Only the traffic over the Internet uses IPSec. In host-to-host IPSec mode, each host must deploy IPSec. This mode would require that any internal hosts that communicate with the VPN clients would need to deploy IPSec.

In gateway-to-gateway IPSec mode, the gateways at each end of the connection provide IPSec functionality. The individual hosts do not. For this reason, the VPN is transparent to the users. This deployment best works when a branch office or partner company needs access to your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In PKI, what is the entity that signs a certificate?

A) a principal
B) a subject
C) a verifier
D) an issuer

A

In Public Key Infrastructure (PKI), an issuer is the entity that signs a certificate. Signing a certificate verifies that the name and key in the certificate are valid. PKI is a system designed to securely distribute public keys. A PKI typically consists of the following components: certificates, a key repository, a method for revoking certificates, and a method to evaluate a certificate chain, which security professionals can use to follow the possession of keys. Chain of custody might be used in proving legal cases against hackers. Most organizations implement PKI using a PKI Web service so that a third party is responsible for issuing and managing certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the Principle of PKI?

A

A principal is any entity that possesses a public key. A verifier is an entity that verifies a public key chain. A subject is an entity that seeks to have a certificate validated.

While a PKI can be a Web service, other Web services that organizations use include HTTP sites, FTP sites, and social networking sites. All organizations should consider the security and performance ramifications of the use of any of these Web services on the organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is CRL?

A

A certificate revocation list (CRL) contains a list of serial numbers for digital certificates that have not expired, but that a certification authority (CA) has specified to be invalid. Typically, the serial number of a digital certificate is placed in a CRL because the digital certificate has been compromised in some way. A CA, sometimes referred to as a certificate authority, is an entity that issues and validates digital certificates. To create a digital certificate, a user provides a CA with contact information and a public and private key pair. The CA verifies the provided information, and creates a digital document with the user’s contact information and key pair. The CA then encrypts the digital document with its private key to create a digital certificate. Finally, users can use the CA’s public key to determine whether a digital certificate is valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the private key of the root certificate authority?

A

The private key of the root certification authority (CA) must be secured to ensure that the certificates that have been validated in a public key infrastructure (PKI) are protected. If the private key of the root CA has been compromised, then a new root certificate must be created and the PKI must be rebuilt. If the private key of a user’s certificate has been compromised, then a new certificate should be created for that user and the user’s compromised certificate should be revoked. The compromise of a user’s certificate will not jeopardize other certificates in a PKI. A public key, as its name implies, is public, and does not need to be kept secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the cross certification is primarily used for?

A

Cross certification is primarily used to establish trust between different PKIs and build an overall PKI hierarchy. Cross certification allows users to validate each other’s certificate when they are certified under different certification hierarchies. The primary purpose of cross certification is to build a trust relationship between different certification hierarchies when users who belong to different hierarchies are required to communicate, and might require authentication for legitimate connections. The process implies the establishment of a trust relationship between two certification authorities (CAs) through the signing of another CA’s public key in a certificate referred to as a cross certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is unified serviced and network controller?

A

For the Network+ exam, you need to understand two other services: unified voice services and network controllers. Unified voice services are any services in which network (data) and voice services are implemented over the same media. The most popular example of this is Voice over IP (VoIP). Network controllers allow network administrators to manage multiple devices from a central device. For example, Cisco’s Wireless LAN Controller (WLC) model 5760 allows centralized management and control of multiple wireless access points (WAPs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following would be used to help defend against a man-in-the-middle attack?

A) DHCP snooping
B) Root guard
C) Flood guard
D) BPDU guard

A

DHCP snooping prevents an unauthorized DHCP server from issuing IP addresses to clients. The unauthorized or rogue DHCP server is often used in man-in-the-middle attacks. A trusted server is identified on a specific switch port by configuring the DHCP Snooping Trust State. This allows DHCP traffic to flow through the port. A DHCP server attached to a port that does not have a properly configured trust state will have its traffic blocked.

Current Web communications can also be secured against eavesdropping, hijacking, and man-in-the-middle (MitM) attacks through mutual certificate authentication via Transport Layer Security (TLS). The encryption negotiated by TLS between a Web client and Web server provides protection against eavesdropping and hijacking, and the mutual authentication using certificates that provides protection against MitM attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What does BPDU prevents?

A

Bridge Protocol Data Unit (BPDU) guard works with Spanning Tree Protocol (STP) and PortFast. When a switch receives a BPDU, the BPDU guard disables the port on which PortFast has been configured. It prevents looping, not man-in-the-middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What does Flood guard do?

A

Flood guard establishes the maximum number of MAC addresses that can be seen by an interface. The switch monitors the traffic on the interface. If the network gets flooded with MAC addresses, the flood monitor can intervene by disabling ports and filtering out traffic. Denial of Service (DoS) attacks may use traffic flooding to deny valid users the ability to interact with resources at an acceptable level, pace, or throughput. It prevents DoS flooding attacks, not man-in-the-middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

You have expanded the number of nodes on your network and have added a second 24-port switch. The new switch is in place and has sufficient port capacity for another six nodes in the future. What should you do to increase the security of the switch?

A) Upgrade firmware
B) Disable unused ports
C) Use secure protocols
D) Install patches and updates

A

Disabling unused ports is an excellent way to secure a switch. You should only enable designated active ports needed for network connections. As an example, if you have a 24-port switch, but only 18 of those are needed for connected hosts, you should set the status of the other six ports to “disabled.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Why do we always want upgrade firmware?

A

Upgrading firmware is one way to ensure that the network component is performing properly, or to the current standard. Firmware differs from a driver. A driver allows the hardware communicate with an operating system, such as Windows 10, Linux, or OSX. Firmware is the software that allows the hardware device to operate. A simplified example of one aspect of firmware would be the line of instruction on the NIC that causes the green light to blink when network traffic is present.

Installing patches and updates to the network hardware will ensure that the firmware is up to date and that any remedies to known security issues will be corrected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Why do we use secure protocols?

A

Using secure protocols is paramount to network security. In SOHO networks, routers (as an example) are shipped with insecure protocols, such as WEP, enabled. While WEP is the easiest for consumer or novice to use while getting the network up and running, it is inherently insecure and should be disabled in favor of a more secure protocol such as WPA2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What can be used by a hacker to implement a social engineering attack on a network?

A) a multimeter
B) a packet sniffer
C) a remote control package
D) a telephone

A

A telephone can be used by a hacker to implement a social engineering attack in which the hacker attempts to gain critical network information through social interaction with company employees. For example, a hacker might call a user on a network and ask for a user name and password. If the user is not properly trained, then the user might provide his or her user name and password to the hacker.

Dumpster diving is another social engineering method that is carried out by stealing information from a company’s trash disposal. To prevent dumpster diving, destroy all paper and other media that are not required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which one of these requires a user complete an action, such as digitally signing an AUP, prior to accessing the network?

A) MAC filter
B) Port security
C) Captive portal
D) Access control list

A

Captive portals are web pages, typically used in public networks, where users must complete some action before they are granted access to the network. Captive portals are commonly seen in coffee shops, hotels, and airports, and the user often has to accept an acceptable use policy (AUP) before they can connect to the internet.

Port security allows a network administrator to only allow a specific MAC address (or group of MAC addresses) on a switch port. MAC filtering theoretically does the same thing as port filtering, but port filtering works on switches, whereas MAC filtering works on routers.

MAC filtering is accomplished by granting (or denying) network access to a list of MAC addresses. The list of MAC addresses for which you are either granting or denying access to is stored in an access control list (ACL).

ACLs compare the entity that is requesting access to a network resource against a list of valid entities. Access is granted or denied based on the access configured for that entity. Simply put, ACLs identify which users have access to a given object, such as a drive, a file, or a directory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

You work for a medium-sized company. You would like to provide secure, remote access between the company’s three Internet-connected sites and their Windows client, servers, and domain controllers. Which option would provide adequate security and cost the least overall?

A) Create a VPN, and run RDP over the VPN.
B) Purchase WAN links between each pair of sites, and run a commercial VPN over IPSec.
C) Use a freeware VNC to run TeamViewer over the Internet.
D) Use IPSec to secure RDP over the Internet with connection security rules and associations.

A

You should use Internet Protocol Security (IPSec) to secure Remote Desktop Protocol (RDP) over the Internet with connection security rules and associations because it uses only Microsoft-supplied protocols and services. This is the only option that provides an additional layer of encryption and security beyond what is included in RDP or Windows Remote Desktop Connections. The connection security rules and associations work with IPSec to establish how to broker a legitimate RDP connection and to manage proofs of identity and authentication between communicating parties.

Purchasing WAN links between each pair of sites and running a commercial virtual private network (VPN) over IPSec offers strong security. However, doing so would require purchasing dedicated WAN links when Internet costs are lower or already covered through the company’s existing Internet access. This solution also incurs additional costs for a commercial VPN in which to run remote access.

Creating a VPN, and running RDP over the VPN eliminates the cost of WAN links, but incurs the costs for a commercial VPN. Thus, it is not as cheap as the RDP option.

Using a freeware virtual network computing (VNC) to run TeamViewer over the Internet is not a cheaper option because TeamViewer would incur costs to run. In addition, a VNC is not needed as Windows computers include RDP. VNC is an option to use if other operating systems are included.

RDP does not offer complete security by itself. It also fails to provide authentication to verify the identity of RD session hosts. At a minimum, TLS should be employed to strengthen RDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which of the following attacks directs user traffic to a malicious web site without any outside communication from an attacker?

A)ARP poisoning
B)Ransomware
C)Phishing
D)DNS poisoning

A

DNS poisoning, also known as DNS cache poisoning, can direct user traffic to a malicious web site. The attack is accomplished by inserting a bogus record in the DNS server cache, redirecting traffic from the “good” web site to the malicious web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is ARP Poisoning?

A

Address Resolution Protocol (ARP) poisoning, also known as ARP spoofing, occurs when an attacker sends counterfeit messages on the network, resulting in the replacement of a legitimate user’s MAC address with the attacker’s MAC address. Once that happens, the attacker will begin receiving traffic destined for the legitimate user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

You need to define which protocols are allowed to traverse the router, whether the traffic is inbound or outbound, Which of the following should you use?

A) Software-defined networking
B) Distributed switching
C) Packet switching
D) Access control lists

A

An access control list (ACL) allows you to define which types of traffic are allowed into or out of the network on a protocol-by-protocol basis. ACLs can also be configured based on port number, MAC address, IP address, and other criteria.

Distributed switching allows a host to select from a pool of switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Packet switch vs Circuit Switch

A

It is critical that you know the difference between packet-switched and circuit-switched networks. Packet-switched networks break the traffic into small parcels. Depending on the layer at which they reside, those parcels are called packets. Each packet contains, among other things, the destination address. The receiving router uses that destination address to forward the packet to the next router.

Circuit-switched networks require that a connection be established between the sender and the receiver. Once a connection is made (meaning that a circuit is formed), the data is routed from the sender to the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

SDNs what is the function of this?

A

Software-defined networks (SDNs) allow a network administrator to direct and prioritize traffic, and connections, over virtual switches, from a centralized console. SDNs can control the access to switches and routers but do not have anything to do with allowing traffic to traverse a switch or router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

You have a strong wireless password policy, but users (including management) are complaining about it. Consequently, enforcement is difficult. You need a protocol solution that does not require digital certificates. Which of these choices would help you secure your network?

A) Geofencing
B) EAP-FAST
C) PEAP
D) EAP-TLS

A

Extensible Authentication Protocol − Flexible Authentication via Secure Tunneling (EAP-FAST) was developed by Cisco to assist with enforcing strong password policies, and it does not require digital certificates. EAP-FAST is a faster version of Protected EAP (PEAP). EAP-FAST uses protected access credentials (PACs) stored on the supplicant device, somewhat like cookies. With the credentials already stored on the supplicant, authentication can occur more rapidly. Extensible Authentication Protocol (EAP) made the use of certificates, biometrics, and smart cards possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Wireless Security Protocol: PEAP?

A

PEAP first creates a tunnel between the supplicant (client) and the server, and then proceeds with the rest of the steps in the EAP process. PEAP requires certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

EAP-TLS?

A

Extensible Authentication Protocol − Transport Layer Security (EAP-TLS) uses public key infrastructure (PKI) certificates to authenticate the supplicant (client) and the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Geofencing ia type of security that….

A

Geofencing allows an administrator to geographically define the boundaries of wireless access. It is particularly useful if the organization does not want individuals outside the building to have wireless access. Global Positioning System (GPS) or Radio Frequency Identification (RFID) data from the client device is used to request access to the authentication server. If the client device is within the defined boundaries, it will be granted access. Geofencing does not really provide a way to secure your network; it just limits the network’s boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which of these mitigation techniques applies the principle of defense in depth to help mitigate the attacks to which the device is susceptible?

A) Signature management
B) Privileged user account
C) Device hardening
D) Flood guard

A

Device hardening is the application of defense in depth principles to help mitigate the attacks to which the device is susceptible. For a switch, device hardening could include shutting off unused ports. Another example could be blocking traffic on port 23 to prevent traffic on an unused port. Other enhanced security activities, such as password policies and establishing file permissions, are also examples of device hardening. Device hardening provides controls at all layers of the OSI model to provide the defense in depth.

Defense in depth is a multi-layered approach to security that establishes a robust defensive strategy against attackers. This strategy prevents a single attack from being sufficient to breach an environment, forcing attackers to use complex, multi-pronged, daisy-chain attacks that are more likely to fail or be detected during the attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is signature management?

A

Signature management is the monitoring of digital signatures to ensure that file tampering has not occurred. This would only protect against data integrity attacks, not against any other kinds of attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which type of network would be set up in an office for computers and mobile devices that do NOT comply with the company’s NAC policies?

A) wireless network
B) guest network
C) VPN
D) quarantine network

A

A quarantine network would be set up in an office for computer and mobile devices that do NOT comply with the network access control (NAC) policies. A NAC server would hold the policies that would control access to the network. If computers or mobile devices did not have the appropriate security controls configured, they would be placed on the quarantine network to isolate them. This would ensure that they would have limited access to the company network until the appropriate security measures were taken.

A guest network would be set up in an office so that customers could access the Internet but not internal resources, such as printers and servers. A wireless network is configured so that users can wirelessly connect to the LAN. A virtual private network (VPN) is configured to allow personnel to securely access local resources via the Internet through a security VPN tunnel. A benefit from setting up a guest network is the ability to access isolated corporate resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are the concepts of NAC?

A

For the Network+ exam, you need to understand the following NAC concepts:

802.1x − 802.1X is a protocol that authenticates a user before allowing any of the host’s data traffic to be sent to the network. 802.1x authentication can work with the NAC server. While 802.1x is used for authentication, the NAC server will check to see if the appropriate security controls are in place on the authenticating devices based on the NAC policies that are configured.

Posture assessment − This is the process whereby a client is checked against a set of requirements in a NAC policy. If a client meets the requirements, it is given full network access. If a client does not meet the requirements, it is placed on the quarantine network and given limited network access.

Persistent vs non-persistent agents − An agent running on a client computer is a persistent agent if it runs all the time. It is a non-persistent agent if it is run only during an attempt by the client computer to connect to the network via the NAC server.

Edge vs access control − Edge control verifies that users or devices have the appropriate permissions to access resources. NAC verifies that users or devices not only have the appropriate permissions to access resources but also that the users or devices have the appropriate security controls in place to ensure that the NAC client will not cause the network to be breached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which mitigation technique provides less restricted access to a system?

A) Privileged user account
B) File integrity monitoring
C) DMZ
D) Role separation

A

A privileged user account is an account that has less restrictive access to a system. Examples of privileged user accounts include domain administrators, local administrators, and application accounts. Users with privileged accounts can include systems admins, management personnel, network administrators, and database administrators, among others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What does File integrity monitoring help with?

A

File integrity monitoring helps to identify unauthorized changes to files. The monitoring process looks at such events as if or when a file was changed, who made the change, the nature of the change, and what can be done to restore the file to the pre-change state. File integrity monitoring does not provide access to systems, only to files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What does role separation involve?

A

Role separation involves dividing server duties amongst two or more servers to reduce an attack profile. For example, if a server running the Active Directory, DNS, and DHCP roles went down, all those services would be unavailable. If, on the other hand, Server A hosted Active Directory, Server B hosted DNS, and Server C hosted DHCP, an attack that brought Server B down would not affect the other services. Role separation does not affect the levels of access granted to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is a DMZ?

A

A demilitarized zone (DMZ) provides mitigation by placing two firewalls in the network. Critical servers such as email servers and web servers are placed between the two firewalls. A DMZ imposes more restrictions to access, not fewer restrictions.

A demilitarized zone (DMZ) is an isolated subnet on a corporate network that contains resources that are commonly accessed by public users, such as Internet users. The DMZ is created to isolate those resources to ensure that other resources that should remain private are not compromised. A DMZ is usually implemented with the use of firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

You have recently moved several servers that contain confidential information onto a DMZ. What is the most likely valid reason for doing this?

A) encryption of all confidential transaction
B) isolation of all confidential transactions
C) bandwidth improvement for all confidential information transactions
D) compliance with federal and state regulations

A

The most likely valid reason for moving servers that contain confidential information onto a demilitarized zone (DMZ) is compliance with federal and state regulations.

Placing the servers that contain confidential information onto a DMZ will not isolate all confidential transactions because all users on the other subnets will still need to access the confidential information.

Placing the servers that contain confidential information onto a DMZ will not encrypt all the confidential transactions. This would require that you employ data encryption while data is at rest and as it is transmitted.

Placing servers that contain confidential information onto a DMZ will not improve bandwidth for all confidential information transactions. As a matter of fact, because the servers will be isolated on a separate network, transactions with those assets may actually cause performance to degrade. Any transactions would need to cross the firewall into the DMZ, thereby slowing does the transaction speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which technology provides centralized remote user authentication, authorization, and accounting?

A) VPN
B) DMZ
C) Single sign-on
D) RADIUS

A

Remote Authentication Dial-In User Service (RADIUS) provides centralized remote user authentication, authorization, and accounting.

RADIUS is defined by RFC 2138 and 2139. A RADIUS server acts as either the authentication server or a proxy client that forwards client requests to other authentication servers. The initial network access server, which is usually a VPN server or dial-up server, acts as a RADIUS client by forwarding the VPN or dial-up client’s request to the RADIUS server. RADIUS is the protocol that carries the information between the VPN or dial-up client, the RADIUS client, and the RADIUS server. The centralized authentication, authorization, and accounting features of RADIUS allow central administration of all aspects of remote login. The accounting features allow administrators to track usage and network statistics by maintaining a central database.

64
Q

Your wireless network has come under attack in recent weeks. A technician suggests that you implement 802.1x security instead of 802.11 WEP security in the wireless network. What is the advantage of using 802.1x security over 802.11 WEP security?

A) 802.1x security generates dynamic encryption keys.
B) 802.1x security uses a 32-ASCII-character SSID.
C) 802.1x security uses static WEP keys for encryption.
D) 802.1x security uses one-way authentication.

A

The advantage of using 802.1x security over 802.11 Wired Equivalent Privacy (WEP) in a wireless local area network (WLAN) is that 802.1x security generates dynamic encryption keys. Two types of security standards can be implemented in a WLAN: 802.11 WEP and 802.1x security standards. The 802.11 security standard uses WEP keys for securing the data transferred over WLANs. You can configure either 40-bit or 128-bit static WEP keys for security over WLANs. The 802.1x security standard uses various authentication types based on the Extensible Authentication Protocol (EAP). These include the following:

EAP-LEAP: Uses username and static password for authentication.
EAP-TLS: Uses digital certificates for authentication.
EAP-PEAP: Uses digital certificate, username, and static password or one-time passwords for authentication.

The 802.1x security standard supports RADIUS server-based authentication, which provides centralized authentication, authorization, and accounting (AAA) service. RADIUS and 802.1x can be used to authenticate remote workers who connect from offsite.802.1x security also supports Network Access Control (NAC), also called Network Admission Control. This feature, offered by some authentication servers, can check device characteristics prior to allowing access to the network. Characteristics that can be checked include operating system version, antivirus software version, and so on. An administrator configures that NAC server to deny or allow access based the configuration baseline. A posture assessment is performed on the client computer to ensure that it meets the configuration baseline. A posture assessment can examine Windows registry settings antivirus software, Active Directory membership, and other settings.

65
Q

Which option is a method of providing physical security for a network?

A)the use of public keys
B)the use of message digests
C)the use of passwords
D)the use of security badges

A

Physical security limits access to the physical components of a network. Of the choices listed, the use of security badges is a method of providing physical security for a corporate network because only individuals with valid badges are allowed on company premises or in particular company areas.

66
Q

Where does physical security controls entail?

A

For the Network+ exam, you must understand the following physical security controls:

Mantraps or access control vestibules − a set of double doors usually monitored by a security guard. Only one person is allowed to enter the second set of doors when buzzed in by the security guard or by scanning their identification card.
Network closets − All networking devices, including routers and switches, should be protected from public access by placing them in locked closets or rooms.

Video monitoring − Video monitoring, including IP cameras and closed-circuit television (CCTV), records all activities that occur in the monitored areas. If tapes or DVDs are used, you should have a regular replacement schedule. A system that uses some sort of hard drive is a better option because it will allow more storage. In most cases with video monitoring, once the recording medium fills, new recorded data will overwrite older recorded data. So consider carefully any repercussions of any system you may use.

Door access controls − Door access controls include any mechanism that is used to ensure that only authorized personnel can enter through a specific door. The most popular door access control is a lock with a key. However, you can also use keypads or cipher locks, which allow you to periodically change the entry code and may even allow you to issue different codes to personnel to allow you to track entry and exit.

Proximity readers/key fob − requires the use of some sort of proximity or smart card to enter the building or data center. Preventing access to a user with a valid card is as simple as disabling that user’s card.

Biometrics − uses some sort of physical or behavioral characteristic to allow access. Users may scan their iris, retina, fingerprint, or some other physical characteristic. Behavioral versions require the user to input a certain pattern, write a certain phrase, or even input a certain phrase.

67
Q

Your company implements a honeypot as intrusion prevention. Management is concerned that this honeypot would be considered entrapment and has asked you to ensure that entrapment does not occur. Which situation should you prevent?

A) open ports on a honeypot
B) Web browsing on a honeypot
C) open services on a honeypot
D) downloads on a honeypot

A

You should prevent downloads on a honeypot. Allowing downloads on a honeypot is a possible example of entrapment if it is used to make formal trespassing charges. Entrapment occurs when a hacker is tricked into performing an illegal activity. Entrapment is illegal.

Opening port and services and allowing Web browsing on a honeypot are not examples of entrapments. They are enticements. Enticement allows the administrator to monitor activity to increase security and perhaps trace the attack. Enticement is legal. A honeynet is a group of honeypots that work together.

68
Q

You have configured a new file server for your company. Now you have been tasked with configuring the appropriate access control lists (ACLs) on all the file server folders. Which two principles affect the design of ACLs? (Choose 2)

A) SESAME
B) Kerberos
C) least privilege
D) need to know
E) single sign-on

A

Need to know and least privilege affect the design of access control lists (ACLs). The need to know principle ensures that subjects are only given access to objects they require to complete their duties. The least privilege principle ensures that subjects are given the minimum level of access permissions they require to complete their duties. The concept of least privilege is based on the idea of zero trust. Zero trust is a security best practice of always assuming that someone who is attempting to gain access to or is already within the network is going to engage in malicious activity of some kind. The main principles of the Zero Trust model are to always verify users and data explicitly, always assume a breach can occur within your network, and utilize least privilege to minimize malicious insiders or compromised accounts.

ACLs for files usually allow or deny access to the file based on permission configured for user or group accounts. ACLs on devices, such as routers, firewalls, and so on, usually allow or deny access to the device based on MAC filtering, IP filtering, or port filtering. MAC filtering is based on the MAC address of the client’s network interface card (NIC). IP filtering is based on the IP address of the client’s NIC. Port filtering is based on the port being used. Restricting access via ACLs is one of the most common security controls used.

69
Q

What does Kerberos and SESAME do?

A

Kerberos and SESAME are two authentication protocols that affect the design of the authentication process. Both of these protocols allow single sign-on, which means that users only login once. When designing ACLs, you should keep in mind that the default level of security should be no access. In your security design, what is not explicitly allowed should be implicitly denied.

70
Q

Which condition might indicate that a network is undergoing a DoS attack?

A) a slight decrease in network traffic
B) a significant increase in network traffic
C) a significant decrease in network traffic
D) a slight increase in network traffic

A

A significant increase in network traffic, often referred to as a traffic spike, might indicate that a network is undergoing a denial-of-service (DoS) attack, which occurs when a hacker floods a network with requests. Virtualization can help to prevent DoS attacks. Performance baselines can help to determine if you are undergoing a DoS attack.

A DoS attack prevents authorized users from accessing resources they are authorized to use. An example of a DoS attack is one that brings down an e-commerce Web site to prevent or deny usage to legitimate customers.

A significant decrease in traffic might indicate a problem with network connectivity or network hardware, or it might indicate a non-DoS hacker attack. Networks with slightly fluctuating traffic levels are probably operating normally.

71
Q

An employee shows you a Web site that publishes the SSIDs and passwords for private wireless networks in your area. The information on your company’s wireless network is included. Of which type of attack is this an example?

A) WPA cracking
B) WEP cracking
C) evil twin
D) war chalking

A

This scenario is an example of war chalking. War chalking originally occurred when hackers wrote SSID and security information on the side of buildings. This attack has steadily evolved to the point where hackers are now publishing this information on Web sites.

WEP cracking is the process of cracking WEP security. WPA cracking is the process of cracking WPA security.

War driving is also a wireless attack. However, with war driving, attackers drive around and attempt to discover wireless networks that are transmitting.

An evil twin attack occurs when a wireless access point that is not under your control is used to perform a hijacking attack. An evil twin is a type of rogue access points. You should periodically perform a site survey to discover rogue access points. Rogue access points can be connected to either the wired or wireless network.

72
Q

Which action would you perform to look for candidates for exploitation across an information system?

A) Vulnerability scanning
B) Port scanning
C) Patch management
D) Log reviewing

A

Vulnerability scanning looks for areas that are candidates for exploitation (weak spots) in networks, operating systems, applications, and equipment. Vulnerability scans can also identify the effectiveness of in-place systems designed to prevent those exploits.

Another useful tool that can be used during vulnerability scanning is a Common Vulnerabilities and Exposures (CVE) system. This system acts as a reference model for all publicly known information-security vulnerabilities and exposures. This system can identify the severity levels of vulnerabilities found in a network and provide remediation tactics to minimize their impacts.

73
Q

Which of the following can use RFID to identify the location of the object?

A) Asset tags
B) Key fobs
C) Biometrics
D) Locks

A

Asset tags, also referred to as asset tracking tags, can be labels with barcodes or QR codes, or can include radio frequency identification (RFID) chips that provide electronic tracking. Asset tracking tags are used to assign a number to particular piece of equipment (an asset) and use that number to monitor where the asset is. They can be used in conjunction with geolocation and geofencing.

74
Q

A hacker has called a company employee and learned the employee’s user name and password by posing as a member of corporate technical support. Which type of attack has the company suffered?

A) social engineering
B) buffer overflow
C) brute force
D) denial of service

A

The company has suffered a social engineering attack, in which a hacker poses as a company employee or contractor to gain information about a network from legitimate company employees. A hacker typically uses social engineering to gain user names and passwords or sensitive documents by non-technical means, such as posing as an employee or dumpster diving. A company can help protect itself from a social engineering attack by requiring employees to attend security awareness training, which is one of the most neglected aspects of network security.

75
Q

LIst all the network attacks?

A

For the Network+ exam, you also need to understand the following attacks:

Session hijacking − takes over a Web session by surreptitiously obtaining the session ID and masquerading as the authorized user.

VLAN hopping − send packets to a switch port which is generally not accessible. The attacker then attempts to change the security settings that are in place. If an attacker connects to an unused Voice over IP (VoIP) phone port to gain unauthorized access to a network, VLAN hopping has occurred.

Compromised system − a system that has been the victim of an attack. The types of compromised systems vary greatly based on the type of attack that has occurred. Compromised systems should be isolated until the security issues can be removed. An example of this is when packet analysis reveals that multiple GET and POST requests from an internal host to a URL without any response from the server.

Insider threat/malicious employee − a common attack that is carried out by personnel that has legitimate network access. These are often the hardest to detect because valid credentials are used.

Zero-day attacks − occurs when a security issue that is unknown to the device or application vendor is exploited prior to a security update being issued.

ARP cache poisoning − occurs when an attacker sends Address Resolution Protocol (ARP) messages to a network to associate the attacker’s MAC address with the IP address of another host, such as the default gateway. This will cause traffic meant for that IP address to be sent to the attacker instead

Packet/protocol abuse − occurs when an attacker attempts to exploit the protocols or packets that are transmitted over a network.

76
Q

You are a network administrator for a company that maintains LANs in Los Angeles and Paris. You want to use PPTP to create a VPN connection between the LAN in Paris and the LAN in Los Angeles. A PPTP server has been configured on each LAN.

Which protocol should you use to establish a connection between the PPTP servers?

A) PPP
B) SLIP
C) HTTP
D) Telnet

A

Of the choices presented, you should use Point-to-Point Protocol (PPP) to establish a connection between the Point-to-Point Tunneling Protocol (PPTP) server in Los Angeles and the PPTP server in Paris. You can use PPP to transmit TCP/IP network communications over point-to-point connections. PPP can also be used to transmit other network protocols, such as Network Basic Input/Output System Extended User Interface (NetBEUI) and Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX). PPP supports error checking and automatic configuration of network protocol parameters. Multilink PPP is a communications protocol that enables a computer to use two PPP ports to provide greater bandwidth.

PPTP is an extension of PPP that was created by Microsoft to establish virtual private network (VPN) connections. To create a VPN connection between the two computers in this scenario, you should first establish a PPP connection between the PPTP server in Los Angeles and the PPTP server in Paris. Then, you should establish a PPTP connection through the PPP connection. Note that PPP is not used to establish a VPN connection. PPP acts as a carrier for PPTP, which is used to establish a VPN connection.

Serial Line Internet Protocol (SLIP) is an older point-to-point protocol that enables the transmission of TCP/IP communications over a serial connection. SLIP only supports TCP/IP, and SLIP does not support error checking or automatic configuration of network protocol parameters. You cannot use SLIP to establish a VPN connection. Hypertext Transfer Protocol (HTTP) is used to transmit Web pages. Telnet is used to establish a console session with a remote host on a TCP/IP network. You cannot use HTTP or Telnet to establish a VPN connection.

77
Q

What is typically used to conceal the nature of a social engineering attack?

A) excess bandwidth
B) encryption
C) users’ good intentions
D) believable language

A

Believable language is typically used to conceal the nature of a social engineering attack. An example of a social engineering attack is an e-mail hoax that is written in such a way that it causes non-technical users to panic because they think their computers have been compromised by a virus. E-mail hoaxes typically use company names and technical language that are designed to dupe non-technical users into believing the hoax.

Phishing is a special type of social engineering attack that relies on deception and misinformation. A social engineering attack involves acquiring information by means of an e-mail, phone call, or some other method. Social engineering attacks are successful largely as a result of users’ good intentions. Users want to warn others, so they forward the e-mail message that contains the fraudulent virus warnings to others. A social engineering attack can create heavy bandwidth loads on networks while users are replicating the message. Some social engineering attacks identify key system files as viruses and direct users to delete these files. Virus warnings contained in unsolicited e-mail messages should be verified with virus authorities, such as McAfee or Symantec, before those warnings are heeded. Encryption is not typically used to conceal the nature of a social engineering attack.

78
Q

Your wireless network signals need to be contained within the building. Access points must be placed so that users in offices along the outside wall of the building have the same level of service as other employees. You do not want someone sitting in the parking lot sniffing the network for sensitive data. What can you implement to define the boundaries of the network?

A) MAC filtering
B) Geofencing
C) EAP
D) EAP-TLS

A

Geofencing allows an administrator to geographically define the boundaries of wireless access. It is particularly useful if the organization does not want individuals outside the building to have wireless access. Global Positioning System (GPS) or Radio Frequency Identification (RFID) data from the client device is used to request access to the authentication server. If the client device is within the defined boundaries, it will be granted access.

79
Q

A user reports that a legacy system is no longer responding. After researching, a technician reports that the system has been flooded with ICMP packets larger than 65,535 bytes. This is most likely the result of which type of attack?

A) backdoor access
B) malware
C) ping of death
D) ARP issues

A

This is most likely the result of a ping of death attack. In a ping of death attack, a system or network is flooded with ICMP packets larger than 65,536 bytes. You can prevent this type of attack by not allowing ICMP messages from outside your network.

80
Q

What is the backdoor access?

A

This scenario is not the result of backdoor access, also referred to as improper access. Backdoor access is usually obtained through using a backdoor utility or by using some built-in developer hook in an application that allows developers to circumvent normal authentication. It is often very hard to detect backdoor access. Companies should track the open-source projects that enter their network from external untrusted sources, such as open-source code repositories, and should rapidly respond to any backdoors discovered.

81
Q

What can you use to mitigate ARP poisoning?

A

This scenario is not the result of ARP issues. This is often accomplished by poisoning the ARP cache of computers. ARP poisoning can also be referred to as man-in-the-middle (MITM) attacks. You can use dynamic ARP inspection at routers to help mitigate this issue. Dynamic ARP inspection is a security tool that can be utilized to reject malicious or invalid ARP packets from engaging with the network

82
Q

What happens when you have a misconfigured firewall?

A

Misconfigured firewall − allows vulnerabilities to be exposed, giving attackers the opportunity to exploit the firewall itself or the internal and DMZ devices the firewall was intended to protect. You should never allow all traffic into your internal network from the outside untrusted network. In addition, disable or remove any default accounts. If possible, configure the firewall to send alerts any time a configuration change has occurred. This would ensure that you would know that a configuration change has occurred and allow you to verify if the change was valid or carried out by an attacker.

83
Q

What happens when Misconfigured ACLS/applications are in the network?

A

Misconfigured ACLs/applications − allows vulnerabilities to be exposed, giving attackers the opportunity to exploit applications or entities protected by the access control list (ACL). Disable or remove any default accounts in applications. Make sure that ACLs are not configured to allow all. ACLs should default to deny for all accounts not given access.

84
Q

What is DoS?

A

Denial of service (DoS) − occurs when a server is flooded with traffic with the intent to shut down the server. In most cases, upgrading your devices and applications with the latest service packs or updates will prevent these attacks.

85
Q

Open and Closed port vulnerabilities?

A

Open/closed ports − allows or denies network access to specific types of traffic based on the port used. You should disable all ports that you are not using. Remember any open ports are avenues of attack.

86
Q

what does ICMP relate issues entail?

A

ICMP related issues − includes ping of death and unreachable default gateway. Most companies simply deny any ICMP from external networks.

87
Q

Vulnerabilities of unpatched firmwares?

A

Unpatched firmware/OSs − allows vulnerabilities to be exposed, giving attackers the opportunity to exploit the unpatched device or computer. Make sure that all patches, security updates, hotfixes, and service packs are deployed in a timely manner to all affected systems.

88
Q

The threat of malicious users?

A

Malicious users − includes both trusted and untrusted users. Often malicious users will use packet sniffing utilities to obtain information about the network to enable attackers to carry out attack. Auditing can help mitigate this issue.

89
Q

Authentications issues?

A

Authentication issues − includes TACACS/RADIUS misconfigurations and default passwords/settings. Terminal Access Controller Access-Control System (TACACS) is a TCP-based protocol used to communicate with an authentication, authorization, and accounting (AAA) server. Remote Authentication Dial-In User Service (RADIUS) is a UDP-based protocol used to communicate with a AAA server. Because TACACS and RADIUS only handle the authentication of remote users, the TACACS/RADIUS server isn’t configured correctly only if valid users are not authenticated or if invalid users are authenticated. When it comes to default passwords, you should disable all default passwords on any authentication servers. Default settings should also be changed. Changing default passwords and settings will help to ensure that attackers cannot use these defaults to breach the network.

90
Q

Banner grabbing/OUI?

A

Banner grabbing/OUI − A banner is the text that is embedded with a message that is received from a host. Usually this text includes signatures of applications that issue the message. Banner grabbing is a fingerprinting technique that relies on morphed or empty TCP packets that are sent over to a target machine. Telnet, Netcat, Nmap and other tools can be used to carry out banner grabbing. First you need to thoroughly analyze what information is leaked. Set up your services properly. Default settings are always insecure. Turn off all the features and services that are unnecessary.

91
Q

Issues with Domain/logical group configurations?

A

Domain/local group configurations − Groups are often used as part of any security configuration. Users are placed into group, and groups are given access to resources. You should periodically audit groups and ensure that their permissions are appropriately configured.

92
Q

What happens when there is Jamming?

A

Jamming − Jamming compromises the wireless environment. It works by denying service to authorized users as legitimate traffic is jammed by the overwhelming frequencies of illegitimate traffic.

93
Q

Which of the following systems would be best isolated on a separate network segment?

A) Kerberos
B) legacy systems
C) VoIP
D) RADIUS

A

Legacy systems would be best isolated on a separate network segment. Network segmentation limits the exposure of these systems and reduces the attack surface by limiting it to only specific groups of users. In addition, you could configure the legacy systems so that they can only be accessed remotely using secure shell (SSH) or some other secure remote access technology.

It is not necessary to isolate any of the other listed systems on a separate network. Kerberos, Remote Authentication Dial-In User Service (RADIUS), and Voice over Internet Protocol (VoIP) are designed to be implemented on corporate networks without segmenting them from regular network traffic.

94
Q

You must decide the type of identification and authentication that will be used on a new company’s network. You must obtain approval on the authentication type from management. What is the most common form of identification and authentication?

A) two-factor authentication
B) user identification with reusable password
C) smart cards
D) biometrics

A

The most common form of identification and authentication is user identification with reusable password. User identifications (IDs) and passwords are something a user knows.

Biometrics, while not the most common form of identification and authentication, is more secure than using user identification and passwords. Biometrics is something you are. A fingerprint, for instance, would be more secure than a password, because your fingerprint will never change.

Smart cards, which are something you have, are not commonly implemented because of expense. However, they are more secure than using user identification and passwords. Smart cards are a Type 2 authentication factor.

Both smart cards and biometrics are forms of physical access control devices. These are designed to control who can gain physical access into a facility or to a specific area within a building.

Two-factor authentication must include two of the following three categories: something you know (Type I), some you have (Type II), or something you are (Type III). Two-factor authentication is not as common as using user identification and passwords. An example of two-factor authentication would be using a password and a smart card. Multifactor authentication uses all three authentication mechanisms. An example of multifactor authentication would be using a password, a smart card, and a retina scan for authentication. Using a username and password is not two-factor authentication because they are both a Type I authentication mechanism.

In some cases, companies also include a third factor, which can be somewhere you are or something you do. Somewhere you are verifies your location based on GPS coordinates or on the device from which you are using. Something you do asks you to complete a task, like performing verification on a different device or entering a PIN from an automated process. Passwords are considered the weakest authentication mechanism. Pass phrases are somewhat stronger because of their complexity. When assessing identification and authentication controls, it is good to maintain a list of authorized users and their approved access levels. A password policy should be implemented that forces users to change their passwords at predefined intervals. User accounts should be terminated when employment is terminated, or suspended while the user is on vacation or leave. Account lockout policies can ensure that unsuccessful login attempts will eventually result in an account being locked out.

95
Q

You need to implement an independent network within your private LAN. Only users in the Research and Development department should be able to access the independent network. The solution must be hardware-based. Which type of network should you deploy?

A) a virtual private network (VPN)
B) a demilitarized zone (DMZ)
C) an extranet
D) a virtual local area network (VLAN)

A

You should deploy a VLAN. This type of network can be used to ensure that internal access to other parts of the network is controlled and restricted. A VLAN is usually created using a switch. VLANs provide a layer of protection against sniffers and can also decrease broadcast traffic. Creating a VLAN is much simpler than using firewalls or implementing a virtual private network (VPN). Whenever implementing a VLAN, organizations should consider making it private. A private VLAN is a type of VLAN where a VLAN is created with ports that are restricted so they can only communicate with given uplinks.

96
Q

Which RADIUS implementation was created to deal with Voice over IP (VoIP) and wireless services?

A)TACACS+
B)XTACACS
C)TACACS
D)Diameter

A

Diameter was created to deal with Voice over IP (VoIP) and wireless services. It was created to address new technologies that RADIUS was not designed to handle. Although Diameter was designed to be backward compatible with RADIUS, some RADIUS servers have trouble working with Diameter servers. A RADIUS server provides authentication, authorization, and accounting (AAA). The server may also be referred to as a AAA server.

Terminal Access Controller Access Control System (TACACS) is the CISCO implementation of RADIUS. TACACS is the first generation and combines the authentication and auditing process. XTACACS is the second generation and separates the authentication, authorization, and auditing processes. TACACS+ is the third generation and provide all the features of XTACACS along with extended two-factor user authentication. TACACS+ adheres to AAA via a centralized database and can service multiple routers and switches. TACACS+ also allows challenge/response and password encryption.

97
Q

A user notifies you regarding the features that are available with his computer’s network card. He says that the network card’s manufacturer has several new features for the network card that he is unable to locate or use. He needs access to these features. What should you do?

A)Upgrade the operating system.
B)Check for firmware updates.
C)Check for driver updates.
D)Check for operating system updates.

A

You should check for driver updates. Periodically, vendors may release new features for their products. For network cards, these new features are part of the driver software. You should not check for operating system updates.

Operating system updates may include new operating system features, but the user is requesting new network card features. These are usually offered as part of a new device driver.

You should not check for firmware updates. Firmware is used for routers, switches, mobile phones, and computers. They are not used for network cards.

You should not upgrade the operating system. The new network card features are part of the device driver software, not the operating system.

98
Q

You have recently been hired by a company as its network administrator. Currently, all service packs and security updates are deployed directly to the computers and applications that need them. Last month, this resulted in a server outage of four hours because of a bug in a security update. Management wants to prevent issues with any future updates. You need to recommend a solution to this problem. What recommendation should you make?

A) Deploy a guest network.
B) Deploy a test lab.
C) Deploy system restore on all computers.
D) Deploy the updates from a central server.

A

You should deploy a test lab to prevent issues with any future updates. All service packs and other updates will be deployed in the test lab first. If they do not cause any issues, you can then deploy the service packs or updates in the live environment.

You should not deploy a guest network. This type of network is used by guests when they visit your company and allows you to isolate guest access from the internal network.

You should not deploy system restore on all computers. While deploying system restore on all computers is a good measure, this does not prevent issues with any future updates. It will just provide a recovery mechanism that can roll back any computers on which it is installed to a previous state.

You should not deploy updates from a central server. This is often deployed on large networks to make security packs and updates easier to deploy. However, it doesn’t prevent issues with any future updates.

99
Q

Which four of the following statements explains why training employees about proper licensing and use of an organization’s software and hardware is important? (Choose 4)

A)To make effective use of automated license management
B)To practice good organizational ethics and governance
C)To avoid liability from violating license rules or restrictions
D)To comply with license restrictions or limitations
E)To promote minimal consumption of licenses
F)To prevent unauthorized or improper consumption of licenses

A

Training employees about proper licensing and use of an organization’s software and hardware includes the following:

To prevent unauthorized or improper consumption of licenses
To avoid liability from violating license rules or restrictions
To comply with license restrictions or limitations
To practice good organizational ethics and governance
While promoting minimal consumption of licenses can be good for the bottom line, it has nothing to do with honoring or disregarding licensing restrictions. Minimal licensing consumption is usually an IT department issue, not an issue for other employees.

Making effective use of automated license management can check to ensure that licensing restrictions are observed and complied with, but has nothing to do with honoring or disregarding them. Automated licensing is usually an IT department issue.

100
Q

To segregate employee traffic and guest traffic on your wireless network, you have decided to implement a plan whereby guest traffic is quarantined in a separate part of the network. All employees have company-issued devices. What can you implement to ensure that only employees have access to the non-quarantined areas of the wireless network?

A) MAC filtering
B) TKIP-RC4
C) WPA
D) Shared or open authentication

A

Media Access Control (MAC) filtering allows the administrator to restrict device access to the network based on the MAC address associated with the Network Interface Card (NIC) on that device. The administrator can set up a permission list (filter) on the router where only devices with specific MAC addresses are allowed on the network. A MAC address is uniquely associated with a NIC, and is analogous to a Vehicle Identification Number (VIN) on an automobile. In essence, the MAC address is the serial number of the NIC.

101
Q

What is TKIP-RC4?

A

Temporal Key Integrity Protocol-Rivest Cipher 4 (TKIP-RC4) is an encryption method that was designed to provide security enhancements to wireless networks using WEP. WEP was an extremely weak encryption standard. TKIP added a key distribution method whereby each transmission had its own encryption key, an authentication method to verify message integrity, and an encryption method called RC4 (Rivest Cipher 4). WEP is based on RC4, but was poorly designed and used a too-short IV of only 24 bits instead of the standard 64 bits used by RC4.

102
Q

Which malicious software relies on other applications to execute and infect the system?

A)a virus
B)a logic bomb
C)a worm
D)a Trojan horse

A

A virus is malicious software (malware) that relies upon other application programs to execute and infect a system. The main criterion for classifying a piece of executable code as a virus is whether it spreads itself by means of hosts. The host could be any application or file on the system. A virus infects a system by replicating itself through application hosts. Viruses usually include a replication mechanism and an activation mechanism designed with a particular objective in mind. Some of the different types of viruses are:

Compression virus: It decompresses itself on execution but otherwise resides normally in a system.

Viruses usually spread via infected disks (such as floppy disks, CDs, and removable disks), through e-mail, or via infected programs. Executable files should be filtered from e-mail to prevent virus propagation. If you receive an e-mail regarding the transmission of a virus, you should contact your system administrator to see if the e-mail is valid and find out any steps you should take. The systems administrator should investigate the validity of the e-mail. Virus hoaxes can create as much damage as real viruses because the hoaxes result in forwarded e-mails that clog systems, and can result in confidential information being disclosed.

The standard security best practices for mitigating risks from malicious programs, such as viruses, worms and Trojans, include implementing antivirus software, using host-based intrusion detection system, and setting limits on application sharing and execution.

A worm does not require the support of application programs to be executed and is a self-contained program capable of executing and replicating on its own. Typically, a worm is spread by e-mails, transmission control protocols (TCP’s), and disk drives. Worms replicate on their own. A worm can distribute itself without having to attach to a host file.

A logic bomb implies a dormant program that is triggered following a specific action by the user or after a certain interval of time. The primary difference between logic bombs, viruses, and worms is that a logic bomb is triggered when specific conditions are met. An example of a logic bomb is a program that starts deleting files when a certain user ID is deleted.

A Trojan horse is malware that is disguised as a useful utility, but has malicious code embedded. When the disguised utility is run, the Trojan horse performs malicious activities in the background and provides a useful utility at the front end. Trojan horses use covert channels to perform malicious activities, such as deleting system files and planting a back door into a system.

103
Q

What is a stealth virus?

A

Stealth virus: It hides the changes it makes as it replicates. Stealth viruses often intercept disk access requests.

104
Q

Self Garbling Virus?

A

Self-garbling virus: It formats its own code to prevent antivirus software from detecting it.

105
Q

What is Polymorphic virus?

A

Polymorphic virus: It can produce multiple operational copies of itself.

106
Q

Multipart virus?

A

Multipart virus: It can infect system files and boot sectors of a computer system.

107
Q

Macro virus?

A

Macro virus: It generally infects the system by attaching itself to MS-Office applications.

108
Q

Boot sector virus?

A

Boot sector virus: It infects the master boot record of the system and is spread via infected floppy disks

109
Q

Compression virus?

A

Compression virus: It decompresses itself on execution but otherwise resides normally in a system.

110
Q

You want to ensure that the sender of the message or network transmission is authenticated, and not an imposter or a phishing attempt. Which method will provide the highest level of origin authentication?

A)Preshared key
B)WPA
C)AES-CCMP
D)TKIP-RC4

A

Counter Mode with Cypher Block Chaining (CBC) Media Access Control Protocol − Advanced Encryption Standard (AES-CCMP) provides greater security over wireless networks through CBC MAC, ensuring that incoming packets are indeed coming from the stated source. It also provides fast encryption using AES, which encrypts blocks of data instead of individual bits.

In a wireless network, a preshared key (PSK) is an encryption method used with WPA Personal or WPA2 personal. PSK is appropriate for small office-home office (SOHO) networks. A user will request access to the wireless network, supply a passphrase, which is then used with the Service Set Identifier (SSID) to generate a unique encryption key. PSK is not as secure as AES-CCMP.

111
Q

Which of these is NOT an example of multifactor authentication?

A)PIN and iris scan
B)Smart card and password
C)Username and password
D)Signature dynamics and geolocation

A

Username and password is not an example of multifactor authentication. Because both of these factors are something you know, a single factor of authentication is used here.

All of the other options are considered multifactor authentication because they include authentication factors of two different types. Multifactor authentication combines two or more of the following:

Something you know is the most common type of authentication. Passwords, personal identification numbers (PINs), mother’s maiden name, color of your first car, the name of your first boss, and the name of your favorite teacher are all examples of something you know.

Authentication by something you have would be implemented using an item that you have in your possession, such as a smart card, key fob, or USB dongle.

Something you are would be biometric authentication. Fingerprints, iris and retina scans, and even voice-prints can be used to authenticate your identity.

Somewhere you are provides location-based authentication. There are several ways to do this, including getting the GPS coordinates of a cell phone, the location of a cell tower, or an IP address. For example, a company can examine an incoming IP address. If it is identified as originating in a foreign country, authentication fails.

Something you do is based on the way you perform a particular action. One example is keyboard cadence or the way you type a word or phrase. Signature dynamics is another example of
something you do. Even if an attacker guesses your password, he or she will not be able to type or write it in the exact same manner that you do.

112
Q

Which of the following restrictions or requirements for a privileged user agreement does NOT adhere to best practices by clearly delineating the role and responsibility of those who manage computers, systems, networks, or accounts and other information resources?

A)Only those who sign the agreement will be granted privileged access.

B)A user with privileged access may obtain account and password information from another user at will.

C)All privileged access shall be monitored and logged, and such access explained when needed.

D)Those granted privileged access must complete security awareness training

E)Privileged access may only be used to perform assigned job duties.

F)Privileged access may only be used to grant, change, or deny access, privilege, or resources to other users for authorized actions.

A

With the greatest powers to create, configure and manage systems and security, privileged users make the rules and set the conditions that all other users must follow on systems and networks. This calls for extreme care, constant vigilance, and respect for ethics, confidentiality, and the responsibilities of the role. Not even privileged users should be able to obtain account and password information from another user at will. Personnel must be trained to never give their credentials to anyone.

All of the other options are appropriate regarding privileged accounts. The basic rule of privileged access is that only those who take responsibility for their actions and agree to the privileged user agreement, referred to as a Privileged User Agreement (PUA), will be granted such access.

Privileged access may only be used to perform assigned job duties. This statement enunciates the principal that privileged access is a duty to be carried out in strict accordance with the requirements of the job at hand, as well as in compliance with best security practice, ethics, and good governance.

By documenting all actions that privileged users undertake, they may be held to account for their privileged actions at any time. Transparency is the key to proper security.

Use of privilege to establish, alter, or deny access, privileges, or resources for others should occur in keeping with the dictates of the job and one’s employer’s instructions, in keeping with best security practice, ethics, and good governance.

Privileged users should understand and accept the consequences of their uses of privilege and fully understand the potential for loss, damage, or harm that can follow in the wake of errors or mistakes.

113
Q

Which of the following controls can be used as a deterrent, an authentication method, or documentation?

A)Key fob
B)Video surveillance
C)Biometrics
D)Badges

A

Video surveillance can serve as a deterrent, an authentication method, or documentation. It is important to choose the right type of equipment for the business environment. For example, do you need infra-red cameras for low-light situations? Do you need motion detection that would only activate recording when there is movement? How many cameras do you need? How would you place them to provide sufficient coverage and eliminate blind spots? Video surveillance is usually considered a detective physical security control. By saving and storing the information recorded, it acts as documentation.

114
Q

Which term is most commonly used to describe equipment that creates a demilitarized zone (DMZ)?

A)passive hub
B)router
C)active hub
D)firewall

A

A firewall is used to create a demilitarized zone (DMZ). A DMZ is a zone located between a company’s internal network and the Internet that usually contains servers that the public will be accessing. The DMZ implementation provides an extra security precaution to protect the resources on the company’s internal network. Usually two firewalls are used to create a DMZ. One firewall resides between the public network and DMZ, and another firewall resides between the DMZ and private network. All publicly accessible servers should be placed on the DMZ, including servers that personnel must remotely access.

115
Q

Which term is most commonly used to describe equipment that creates a demilitarized zone (DMZ)?

A) passive hub
B) router
C) active hub
D) firewall

A

A firewall is used to create a demilitarized zone (DMZ). A DMZ is a zone located between a company’s internal network and the Internet that usually contains servers that the public will be accessing. The DMZ implementation provides an extra security precaution to protect the resources on the company’s internal network. Usually two firewalls are used to create a DMZ. One firewall resides between the public network and DMZ, and another firewall resides between the DMZ and private network. All publicly accessible servers should be placed on the DMZ, including servers that personnel must remotely access.

A router is used to create individual subnetworks on an Ethernet network. Routers operate at the Network layer of the OSI model. While a firewall can also be a router, it is referred to as a firewall when it functions to create a DMZ. An active hub is used to connect devices in a star topology.

An active hub has circuitry that allows signal regeneration.

A passive hub connects devices in a star topology, but it does not provide any signal regeneration.

116
Q

You company currently has no defined policies or procedures regarding software patches. After researching, you find that software on some computers has been patched, but the patching is spotty at best. You need to prepare a software update patch policy to present to upper management. You need to determine when to install a software patch on a production server. Which of the following is correct?

A) immediately after the patch is released
B) before the patch has been tested
C) when the patch is in beta format
D) after the patch has been tested locally

A

A patch should be installed on a server after it has been tested locally on a non-production server and by the computing community. A security patch is a major, crucial update for the OS or product for which it is intended, and consists of a collection of patches released to date since the OS or product was shipped. A security patch is mandatory for all users, addresses a new vulnerability, and should be deployed as soon as possible. Security patches are usually small. Patch management is a critical part of ensuring that your network is secure. If you do not install the latest patches, security updates, and service packs, your network can be compromised. You should make sure to test all service packs, security updates, and hotfixes in a test lab before deploying them in the live environment. This will ensure that any issues with the updates are detected BEFORE live deployment and can prevent possible downtime. This is also important when a vendor releases an updates or new version of a Web-based application. Always test the software in a test lab first.

117
Q

What issues arises when you conduct an OS updates?

A

OS updates − Operating system (OS) updates come in many forms. Service packs are usually fully tested by the vendor and contain all updates and hotfixes since the last service pack. Hotfixes are released to fix an urgent issue and are not tested as stringently as service packs. Other updates can be released periodically to fix minor issues and are usually tested a bit more than hotfixes, but not as much as service packs. However, you should still test any OS updates in a lab environment BEFORE you deploy them in the live server and client computers.

118
Q

What issues arise when you conduct a Firmware update?

A

Driver updates − Driver updates are released by device or component vendors, including video cards and network cards. Make sure to install the driver that is appropriate for your OS version.

119
Q

What issues arise when you conduct a feature changes and update?

A

Feature changes/updates − Feature changes or updates are released by OS and application vendors to provide users with additional functionality. Only deploy those features that your users need, because the features will require storage space.

120
Q

Major vs minor update issues?

A

Major vs minor updates − While both major and minor updates should be deployed, you should read the documentation that comes with the update to see if your organization considers it to be major or minor. What the vendor may consider major, the vendor may only consider minor. Deploy any major updates as quickly as possible.

121
Q

Issues with vulnerabiliy patches?

A

Vulnerability patches − A vulnerability patch is usually a security patch. These patches are usually very important to prevent security breaches or exploitation of the vulnerability.

122
Q

Issues with upgrading vs downgrading?

A

Upgrading vs downgrading − Upgrading is the process is installing the next version of an OS or application. Downgrading is the process of reverting to a previous version of an OS or application. If available with your operating system, you should some sort of system restore program to create a savepoint before you install a new OS or application version. This will allow you to easily revert back to the previous version using the savepoint you created.

123
Q

Issues with configuration back up?

A

Configuration backup − A full backup is suggested before you install any patches, hotfixes, service packs, new OS versions, or any other update. However, many OSs now offer a system restore program that will create savepoints. This process is usually much faster than a full backup. Also, restoring a savepoint is much quicker when compared to the restore time of a backup.

124
Q

Which of these controls could be used to trigger an alarm in the event of unauthorized entry into a room or building?

A) Tamper detection
B) Motion detection
C) Asset tracking tags
D) Smart cards

A

Motion detection sensors could be used to trigger an alarm in the event of unauthorized entry into a room or building. Motion detection is the process of installing security devices that would detect movement and set off an alarm, create an alert, or even trigger video recording. For example, if a business is closed over the weekend, the business can set up a motion detection system to detect unauthorized activity in the premises during the closed period.

Motion detection, video surveillance, asset tracking tags, and tamper detection are all considered to be physical security detection devices. They detect when a security event has occurred.

125
Q

What is tamper detection?

A

Tamper detection involves implementing a method to determine if something has been altered without authorization. The method could be something as simple as a seal over a door. If the seal is broken, the door has been opened. Tamper detection can also be used in surveillance cameras. If a camera is struck (changing its field of view) or no longer transmitting, an alert can be sent to the monitoring console indicating that the camera has been tampered with. Tamper detection is commonly used on computer cases so that technicians can detect if the case has been opened. Most tamper detection is manual and does not provide any mechanism where an alarm is triggered.

126
Q

What is asset tracking tags?

A

Asset tracking tags are used to assign a number to particular piece of equipment (an asset) and monitor where the asset is. Asset tags can be labels with barcodes or QR codes, or be equipped with radio frequency identification (RFID) chips that provide electronic tracking. Asset tags can be used with geofencing to prevent devices from leaving a certain area, or with geolocation to ensure that the asset can be located within a certain area. However, an asset tracking tag would not detect motion within a facility.

127
Q

Your company has a main office and three branch offices throughout the United States. Management has decided to deploy a cloud solution that will allow all offices to connect to the same single-routed network and thereby connect directly to the cloud. Which of the following is the BEST solution?

A) P2P
B) Site-to-site VPN
C) MPLS VPN
D) Client-to-site VPN

A

The best solution is to deploy a Multiprotocol Label Switching Layer 3 (MPLS L3) virtual private network (VPN). This will allow all offices to connect to the same single-routed network and connect directly to the cloud.

128
Q

Split vs Full tunneling?

A

For the Network+ exam, you will also need to understand the difference between a split tunnel and a full tunnel. A spilt tunnel divides internet traffic and sends some it through an encrypted VPN tunnel and routes the other data through a different tunnel separately on an open network. The purpose of a split tunnel is to allow a user to chose which applications will be secured and which can connect normally. A full tunnel differs in that all information is sent through an encrypted tunnel while utilizing the VPN. While this is a less risky option, it is also more costly.

129
Q

The owner of your favorite pastry shop has just installed free Wi-Fi access for customers. The owner accomplished this task with limited technical skills and without any assistance. After a couple of days in operation, the owner calls to complain that he cannot get into the Wi-Fi router to make an adjustment. First, you have him use the hard reset function built into the router. What action would you recommend that the owner take next?

A) Upgrade the firmware.
B) Change the default credentials.
C) Patch and update the router.
D) Generate new keys.

A

Changing default credentials is important for router and switch security, particularly with SOHO routers. Default credentials are published by the router manufacturers, and an easy search using the router model number will provide you (and an attacker) with the information needed to reconfigure the router. Changing the default credentials is an essential step in securing your network.

While the other options can harden the router, the first and most crucial step is to change the default credentials because they are widely known and can be used by attackers.

130
Q

Which attack involves the use of multiple computers with the purpose of denying legitimate access to a critical server?

A) denial-of-service (DoS) attack
B) Ping of Death attack
C) distributed denial-of-service (DDoS) attack
D) land attack

A

Distributed denial-of-service (DDoS) attacks are an extension of the denial-of-service (DoS) attack. In DDoS, the attacker uses multiple computers to target a critical server and deny access to the legitimate users. The primary components of a DDoS attack are the client, the masters or handlers, the slaves (or bots), and the target system. The initial phase of the DDoS attack involves using numerous slaves and planting backdoors in the slaves that are controlled by master controllers. Handlers are the systems that instruct the slaves to launch an attack against a target host. Slaves are typically systems that have been compromised through backdoors, such as Trojans, and are not aware of their participation in the attack. Masters or handlers are systems on which the attacker has been able to gain administrative access.

The primary problem with DDoS is that it addresses the issues related to the availability of critical resources instead of confidentiality and integrity issues. Therefore, it is difficult to detect DDoS attacks by using security technologies such as SSL and PKI. To detect the use of zombies in a DDoS attack, you should examine the firewall logs. A botnet is a form of command and control network. Command and control refers to the process in which an attacker establishes a connection to a compromised asset and begins using that asset to start taking control over a network.A command-and-control server will control a botnet, which consists of multiple bots, or compromised devices. Both zombies and botnets can be used in a DDoS attack. A traditional DoS attack might not disrupt a critical server operation, but a DDoS attack can overwhelm the server with multiple requests until it ceases to be functional. Trinoo and tribal flow network (TFN) are examples of DDoS tools.

131
Q

What is a land attack?

A

A land attack involves sending a spoofed TCP SYN packet with the target host’s IP address and an open port as both the source and the destination to the target host on an open port. The land attack causes the system to either freeze or crash because the computer continuously replies to itself

132
Q

Dos Attack: Reflective/amplified?

A

Reflective/amplified − uses potentially legitimate third-party component to send the attack traffic to a victim, hiding the attackers’ identity. The attackers send packets to the reflector servers with a source IP address set to their victim’s IP, indirectly overwhelming the victim with the response packets. Domain Name System (DNS) and Network Time Protocol (NTP) servers are particularly susceptible to this attack.

133
Q

Dos Attack: Smurfing?

A

Smurfing − a DDoS attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP Broadcast address. The target of the attack is flooded with packets, causing performance to decline.

134
Q

Dos Attack: Physical Attack?

A

Physical attack − an attack where an attacker attacks a device in such a way as to permanently put it out of commission. Also referred to as permanent DoS, this attack may involve affecting the firmware or infecting the device with malware.

135
Q

Which of the following relies on credentials stored and authenticated on the device being used?

A) Local authentication
B) Kerberos
C) RADIUS
D) Certificates

A

In the case of local authentication, the credentials are stored on the device being used (a local device), not on a remote server. Local authentication is accomplished by the user providing credentials (typically a user name and password) and verifying those credentials against a local database.

136
Q

What is the functions of Kerberos?

A

Kerberos is an authentication protocol that uses a third-party server (a key distribution center or KDC) to provide authentication between a client and a server. A client sends an authentication request to the KDC. The KDC contacts the Active Directory server, which authenticates the user and the user’s authorized groups. The KDC replies to the client with a ticket granting ticket (TGT) containing a session key and the groups authorized for the user. The TGT basically is a “proof of identity”. The client caches that TGT. If the client wants access to a server, the client sends the name of the server, the TGT, and an authentication key to the Active Directory server. The Active Directory server checks with the KDC to ensure the key’s validity and sends the client a service ticket to share with the server. The server validates the service ticket and grants access to the client. Again, this scenario first requires full network authentication.

137
Q

What is a correct description of a honeypot system?

A) a test methodology used to reveal vulnerabilities
B) a type of attack in which the target system is flooded with unauthorized service requests
C) a computer used to entice an attacker
D) a tool used to detect alterations in system files

A

A honeypot system is installed to entice potential attackers. A honeypot system is generally installed together with popular services and enabled ports behind a firewall in a demilitarized zone (DMZ). This system should be isolated to prevent it from hampering the operations of a protected network. The implementation of this system underlines the difference between the concepts of entrapment and enticement. Entrapment refers to inducing an intruder to commit an unintended crime. Enticement refers to the process of rendering a computer vulnerable to attacks by making popular ports and services available on the computer.

A honeynet is an entire system or network of honeypots that are set up to entice attackers.

138
Q

Penetration testing, what is involved?

A

Penetration testing is used to assess a system’s capability to resist an attack and to reveal any system or network vulnerability. Penetration testing, which is also called ethical hacking, is the vulnerability assessment procedure performed by security professionals after receiving the management’s approval. Vulnerability assessments are designed to identify, quantify, and prioritize the various vulnerabilities that can be found within a network. These assessments are designed to make IT teams aware of the holes within their defenses so they can mitigate them. Ethical hackers use tools that have the potential to assess security flaws without exploiting the vulnerabilities in an organization’s network infrastructure. The primary objective of penetration testing or ethical hacking is to assess the capability of the system to resist attacks and to reveal system and network vulnerabilities. Examples of penetration testing include war dialing, sniffing, and scanning.

139
Q

What is another term for a demilitarized zone (DMZ)?

A) screened subnet
B) virtual private network (VPN)
C) screened host
D) dual-homed firewall

A

A screened subnet is another term for a demilitarized zone (DMZ). Two firewalls are used in this configuration: one firewall resides between the public network and DMZ, and the other resides between the DMZ and private network. A DMZ is a separate network segment that contains Internet-accessible servers, which is separated from the Internet and the rest of the private network by a firewall. A system administrator would deploy a Web server on a DMZ if the Web server needed to be separated from other networked servers. The general standpoint behind a DMZ is that all the systems on the DMZ can be compromised because the DMZ can be accessed from the Internet. An e-mail server and FTP server could also be located on a DMZ. If you locate the e-mail server on the private network, you could place an e-mail proxy on the DMZ. An extranet is similar to a DMZ, but is only accessible to partners or clients. Firewall architectures include bastion hosts, dual-homed firewalls, screened hosts, and screened subnets.

140
Q

What is the main purpose of a VPN concentrator?

A) to terminate the VPN tunnels
B) to manage Internet requests and cache Web content
C) to provide dynamic IP addresses
D) to resolve host names and IP addresses

A

The main purpose of a VPN concentrator is to terminate the VPN tunnels.

The main purpose of a DNS server is to resolve host names and IP addresses.

The main purpose of a DHCP server is to provide dynamic IP addresses.

The main purpose of a proxy server is to manage Internet requests and cache Web content.

141
Q

Which of the following provides both authentication and authorization using UDP?

A)RADIUS
B)TACACS+
C)SSO
D)LDAP

A

Remote Authentication Dial-In User Service (RADIUS) servers handle both authentication and authorization over UDP. RADIUS was originally designed for dial-up networking and validates the credentials of a remote user against a stored database. If the validation is successful, the user is granted access (authorization) to network resources.

Terminal Access Controller Access Control System Plus (TACACS+) authenticates the credentials of a remoter user, typically an administrator. Unlike RADIUS, TACACS+ only provides authentication, not authorization.

Lightweight Directory Access Protocol (LDAP) validates user credentials (typically a username and password) against a database stored in a Microsoft Active Directory server, OpenLDAP, or OpenDJ. LDAP runs over TCP.

Single sign-on (SSO) allows a client to access multiple applications with a single set of credentials. As an example, once you log on to the network, those same credentials grant you access to email, a shared drive or other network resources and applications. SSO is a technology that may rely on several underlying authentication technologies. SSO on its own does not use UDP or TCP.

142
Q

In the context of physical security, which statement related to security guard personnel is most appropriate?

A )Security guard personnel are a cost effective countermeasure to reduce physical security risk.
B) Security guard personnel are one of the administrative controls in a layered security architecture.
C) Security guard personnel act as the last line of defense in securing the facility infrastructure.
D) Security guard personnel are the most expensive countermeasure for reducing the physical security risk.

A

Security guard personnel are the most expensive countermeasure used to reduce physical security risks. The cost of hiring, training, and maintaining them can easily outweigh the benefits. Security guard personnel, in combination with other physical security controls and technical controls such as fences, gates, lighting, dogs, CCTVs, alarms, and intrusion detection systems, act as the first line of defense in maintaining the security of a facility infrastructure.

Security guards are the best protection against piggybacking. Piggybacking is a physical cyber-attack where an unauthorized party gains access to the premises by following an authorized employee in the door as they open it. A similar social engineering attack to piggybacking is tailgating. Tailgating is when a malicious actor gains access to a restricted premises of an area by following after someone who has just opened a door to a restricted area.The main difference is that piggybacking occurs with the authorized user’s knowledge, while tailgating does not.

Mantraps (also known as access control vestibules) also provide protection against piggybacking. The last line of defense is the remaining workforce of the company, excluding the security guards, in a layered security architecture. Personnel are an example of physical security controls and not administrative controls.

143
Q

Your organization needs to perform a risk assessment for their ISP. Which specific type of assessment should you complete?

A) Process assessment
B) Vendor assessment
C) Vulnerability assessment
D) Posture assessment

A

You should complete a vendor assessment. A vendor assessment is designed to evaluate and approve potential third-party vendors to ensure that the products that they are selling or providing are safe and secured to use. When contracting with another business, it is critical to understand who you may be working with, how secure they are, and what vulnerabilities may exist with their products, as those factors can have a significant impact on your own network security. A vendor assessment is a type of business risk assessment.

A process assessment is considered to be a business risk assessment. During a process assessment, an organization will analyze the various process and policies that are in place and assess how secure these routines are. The goal of this assessment is to identify any protocols or policies that create unnecessary risk, such as weak off-boarding polices or weak device management policies. Routinely auditing your own organizations polices ensures that risks are being minimized and that polices remain up to date.

144
Q

What are the three types of security assessment?

A

A threat assessment, a posture assessment, and a vulnerability assessment are all forms of a security risk assessment.

In a threat assessment, an organization will determine the credibility and seriousness of a potential threat, as well as the threat’s likelihood of occurrence. Threats can be manmade, such as a malicious insider, or environmental, such as a flood or earthquake.

Posture assessments are used to provide a detailed analysis of an organization’s current cybersecurity strength. Understanding how strong an organization’s defenses are critical to adequately estimating how exposed an organization may be to a cyber-attack.

Vulnerability assessments are used to identify, quantity, and prioritize the various vulnerabilities within a network. All networks have vulnerabilities, and these assessments help determine where they are and what steps need/can be taken to minimize or remove them.

145
Q

Your organization has implemented Kerberos 5 to authenticate its users. A member of management has asked you to explain ticket granting in Kerberos 5. You want to explain all the components of Kerberos to this member of management. Which entity is a ticket that is granted to a client after a client is authenticated?

A) TGT
B) KDC
C) TGS
D) AS

A

After a client is authenticated on a network that uses Kerberos 5, the client is granted a ticket-granting ticket (TGT). To ensure that tickets expire correctly, clock synchronization used in Kerberos authentication. In Kerberos, a client is granted a TGT from an Authentication Server (AS), which is sometimes referred to as a ticket granting Server (TGS). The client then sends its TGT to a Key Distribution Center (KDC), and the KDC sends a session key to the client. The client then uses the session key to gain access to resources on a Kerberos network. Because the KDC relies on a timestamp to determine the age of a request, a timestamp is included during key exchanges. If the timestamp is older than the allowed grace period for requests, then it is possible that a hacker intercepted the request. Therefore, a network that relies on Kerberos for authentication requires some type of time synchronization service for hosts on a network.

146
Q

Your company plans to redesign its network in the coming months. As part of this redesign, a guest network will be set up to allow any guests to have Internet access. This guest network will be a public network that it isolated from your private corporate network. What does this network segmentation provide?

A) link aggregation
B) improved network performance for internal personnel
C) high availability through redundancy
D) improved security through isolation

A

Implementing a separate guest network will provide improved security through isolation. Because the guest network is isolated, you can set up security controls to ensure that guests cannot communicate with the private corporate network.

None of the other solutions are provided by the network segmentation. Link aggregation occurs when two links work together to provide better throughput. High availability through redundancy is ensured when redundant systems are implemented, such as redundant WAN links or redundant RAID arrays. Improved network performance for internal personnel cannot be ensured based on the implementation you have described. The only way to ensure improved network performance for internal personnel is to implement Quality of Service (QoS) or some other technology that allows you to regulate traffic.

147
Q

Employees must use a combination photo identification and security key card to enter a company office building. What is a secure method of determining whether an employee who lost a key card should be allowed to enter the office building?

A) Allow employees to enter the building without a key card.
B) Require a second key card to gain access to the company data center.
C) Require employees to sign a log book.
D) Place digitized photographs of the employees in employee records.

A

Without a secure method of authenticating employees who do not have security key cards, the loss of a key card becomes a potential security risk. Placing photographs in employee records is a secure method of determining whether an employee who lost their key card should be allowed to enter the company office building. A security guard can access a digitized photograph and determine whether to allow an employee to enter the office building. A security guard is a physical security measure.

The requirement than an employee sign a log book if they do not have a key card does not identify the employee as someone allowed to enter an office building. Allowing employees who have lost their key cards to enter a building where key cards are required for entry defeats the purpose of using key cards.

Requiring a second key card to gain access to the data center offers additional limitations on access to company information stores, but does not address the immediate concern of authenticating the employee for entry into the office building.

148
Q

You use HTTPS to secure your e-commerce website. You suspect an external breach has occurred. What should you do to enhance transaction security?

A) Generating new keys
B) Avoiding common passwords
C) Disabling IP ports
D) Hashing files

A

You should be concerned with generating new keys. If a breach has occurred, and the attacker has managed to obtain the keys, generating new keys will keep the attacker from using the stolen keys again.

Avoiding common passwords is critical to establishing basic security. Refrain from using dictionary words, names, numbers-only passwords, and keyboard patterns, like qwerty. In a recent NIST study, the most secure passwords are comprised of three to four random 10+ character words, such as “ElephantConstitutionInternationalConvention.”

Disabling IP ports helps limit the type of traffic on your network, and also provides fewer dormant ports for hackers to exploit. As an example, if you do not want a PPTP VPN on your network, you should disable port 1723.

File hashing is an excellent security measure to detect whether or not a file has been intercepted and altered. An algorithm is used to create a unique value (hash) based on the file’s contents. The recipient of the file uses the same algorithm to generate a hash. If the two hash values match, the file has not been altered. Examples of hash algorithms include MD5, SHA1, and CRC32.

149
Q

What is the aim of security awareness training?

A) All employees in the IT department should be able to handle social engineering attacks.
B) All employees must understand their security responsibilities.
C) All employees in the IT department should be able to handle security incidents.
D) All employees excluding top management should understand the legal implications of loss of information.

A

The primary aim of security awareness training is to ensure that all employees understand their security responsibilities, the ethical conduct expected from them, and the acceptable use of an effective security program. It is important to understand the corporate culture and its effect on the security of the organization.

User responsibilities for protection of information assets are defined in the organization’s information security policies, procedures, standards, and best practices developed for information protection. Security awareness training may be customized for different groups of employees, such as senior management, technical staff, and users. Each group has different responsibilities and they need to understand security from a perspective pertaining to their domain. For example, the security awareness training for the management group should focus on a clear understanding of the potential risks, exposure, and legal obligations resulting from loss of information. Technical staff should be well versed regarding the procedures, standards, and guidelines to be followed. User training should include examples of acceptable and unacceptable activities and the implication of noncompliance. User training might be focused on threats, such as social engineering, which can lead to the divulgence of confidential information that may hamper business operations by compromising the confidentiality and the integrity of information assets. Staff members should particularly be made aware of such attacks to avoid unauthorized access attempts. End user awareness and training is the responsibility of management and should include training, policies, and procedures to ensure that organizational security is understood by all personnel.

Before developing security awareness training, it is important that the corporate environment is fully understood. Let’s look at an example. Suppose an organization notices that a large amount of malware and virus infections have occurred at one satellite office while there are hardly any at another almost identical office. If both sites are running the same company image and receive the same company group policies, then it is most likely that the office with the most incidents should have their end-user awareness training examined. End-user awareness training must be provided to all employees at all levels to provide the protection for the company.

150
Q

You are a network administrator for a Windows Server 2012 domain. Recently, you have noticed network performance issues when Microsoft operating systems and applications release new service packs or updates. All server and client computers are configured to automatically download and install any updates. You need to deploy a solution that will reduce the network performance issues when these updates are released. What should you do?

A) Change the configuration of all computers to never check for updates.

B) Change the configuration of all computers to check for updates but wait for the user to download and install them.

C) Change the configuration of all computers to download updates but wait for the user to install.

D) Deploy a centralized Windows Software Update Services server that will download and deploy the updates, and deploy a group policy that ensures that all servers and clients obtain their updates from the centralized server.

A

You should deploy a centralized Windows Software Update Services (WSUS) server that will download and deploy the updates and deploy a group policy that ensures that all servers and clients obtain their updates from the centralized server. The WSUS server will download all the updates needed for clients and servers. This means that an update will only need to be downloaded once from the Internet. By using a group policy, you can configure the server and client computers to obtain the updates from the centralized server. This will allow you to configure the day and time that servers and clients will check for updates. Therefore, you can deploy the updates during off-peak times and minimize network performance issues due to updates.

151
Q

What attack is also considered to be a social engineering attack?

A) a logic bomb
B) a backdoor
C) an e-mail hoax
D) a Trojan horse

A

An e-mail hoax is also referred to as a social engineering attack. An e-mail hoax is an e-mail message that contains a false warning about a potential virus infection. As well-meaning users forward an e-mail hoax to other users, resulting in increased e-mail traffic that can seriously deplete the amount of bandwidth available on a network. Most network-bound viruses are spread by e-mail. Social engineering attacks are those attacks that rely on personnel to reveal information that will allow an attack to be carried out. The best defense against social engineering attacks is security training.

A logic bomb is a program that is designed to destroy network resources when a specified event occurs. A backdoor is an unguarded pathway into a network. A Trojan horse is a program that seems innocuous but contains malicious code that can damage network resources or provide hackers with a pathway into a network.

152
Q

You have been hired as the network administrator for your company. The departing network administrator explains that your company uses an authentication server (AS) and a ticket-granting server (TGS) to provide authentication. Which technology is the company using?

A) Kerberos
B) TCP
C) SSL
D) HTTPS

A

Kerberos uses ASs and TGSs to provide network authentication. The Kerberos authentication protocol has been implemented in the Windows 2000 operating system and on several versions of the UNIX operating system, including FreeBSD. Kerberos is an authentication protocol based on Data Encryption Standard (DES) that was developed at MIT to securely authenticate network users. DES was developed by the U.S. government in the early 1970s to encrypt government documents. DES uses a 56-bit encryption key. A stronger version of DES, known as Triple DES, uses a 168-bit encryption key. When a user logs on to a network that uses Kerberos, the user’s client computer sends a request for a ticket-granting ticket (TGT) to a Kerberos server, which usually acts as an AS and a TGS. The server, in its role as an AS, sends the client a TGT. When the user wants to gain access to a network resource, the user’s client computer sends the TGT to the TGS, and the TGS uses the information in the TGT to construct a service ticket. The client computer then sends the service ticket to the network service, and the network resource analyzes the service ticket to determine whether the user is allowed to gain access to the resource.

153
Q

You are concerned about malware and workstation security, and you do not want users to use USB flash drives to export or import files. You also have no need for Telnet or FTP services. What should you do to increase security on your systems? (Choose 2)

A) Change the default credentials.
B) Use secure protocols.
C) Disable unnecessary services.
D) Disable device ports.

A

Disabling unnecessary services helps reduce the number of potential exploits available to an attacker. By default, Windows starts what are typically unnecessary services during bootup. As an example, you should disable FTP publishing if you do not need FTP service, and disable removable storage if you feel it is not needed. You can see which services are running by going to Start -> Run -> Services.msc.

Device ports (physical and virtual) should be turned off or disabled when not in use. Disabling physical ports on a computer, switch, or router prevents an intruder from connecting an unauthorized machine to an empty port. In addition, you can disable TCP or UDP ports. As an example, disabling unused logical ports, such as port 23, prevent the use of the unsecure Telnet protocol.

Changing the default credentials is important for router and switch security, particularly with SOHO routers. Default credentials are published by the router manufacturers, and an easy search using the router model number will provide you (and an attacker) with the information needed to reconfigure the router. Changing the default credentials is an essential step in securing your network. However, this will not prevent users from spreading malware through USB flash drives or disable unnecessary services.

Using secure protocols is paramount to network security. In SOHO networks, routers (as an example) are shipped with insecure protocols, such as WEP, enabled. While WEP is the easiest for consumer or novice to use while getting the network up and running, it is inherently insecure and should be disabled in favor of a more secure protocol, such as WPA2. However, secure protocols will not prevent users from spreading malware through USB flash drives or disable unnecessary services.

154
Q

Which social engineering attack is typically considered the most dangerous?

A)physical penetration
B)social engineering
C)Trojan horse
D)dumpster diving

A

Physical penetration is a social engineering attack that is typically considered the most dangerous attack that a targeted hacker can use. A targeted hacker chooses a specific organization or target to attack. In a physical penetration attack, a targeted hacker enters the premises of an organization and gains access to computer systems or plugs a laptop computer into an organization’s internal network. A physical penetration attack is considered the most dangerous type of targeted hacker attack because computer network equipment is typically not well protected inside an organization’s physical location.

In a dumpster diving attack, a hacker searches through an organization’s trash for sensitive information, such as user names, passwords, and documents that were intended to be kept secret.

155
Q

Which one of the following mitigation techniques reduces the attack profile of a device or network?

A)Role separation
B)Honeypot
C)Penetration testing
D)File integrity monitoring

A

Role separation involves dividing server duties amongst two or more servers to reduce an attack profile. For example, if a server running the Active Directory, DNS, and DHCP roles went down, all those services would be unavailable. If, on the other hand, Server A hosted Active Directory, Server B hosted DNS, and Server C hosted DHCP, an attack that brought Server B down would not affect the other services. Because fewer services are hosted on a single device or network, there are fewer services to attack. Attack profiles are also referred to as attack surfaces. Other ways to reduce the attack surface include disabling scripting types, closing unneeded ports, and turning off unneeded virtual servers.

156
Q

Which of the following attacks tricks the user in to giving up personal information?

A)Ransomware
B)Deauthentication
C)Brute force
D)Phishing

A

Phishing is the action of sending out an email that is designed to trick the user into giving up personal information. That information is then exploited by criminal. Phishing emails appear to come from legitimate companies, and when the user clicks on a link in the email, the user is directed to a website that appears authentic. The user then fills in account information, which is captured by the criminal.

All of the other attacks can take place without the user’s knowledge, and therefore do not rely on tricking the user into taking an action that reveals personal information.

Deauthentication attacks disassociate a user with a wireless access point, forcing them to retransmit their login credentials.

A brute force attack attempts to guess the user’s password. This attack differs from a dictionary attack by using additional (random) character combinations, often numbering in the millions. This attack takes significantly more time than a dictionary attack.

Ransomware holds a computer hostage until the user pays a fee. The attacks often begin as an urgent email, where the user is directed to click a link or open a document to resolve the issue. Once the user completes the action, malicious software is installed on the user’s computer, often locking the user out of the system until a fee is paid.