4.0 Network Security Flashcards
You need to deploy 802.1x authentication that supports client-side digital certificates for authentication with access points. Which technology should you deploy?
A)EAP-TLS
B)Cisco LEAP
C)EAP-PEAP
D)WEP
Extensible Authentication Protocol with Transport Layer Security (EAP-TLS) authentication supports client-side digital certificates for authentication with access points. You can configure Cisco Aironet wireless clients with digital certificates for authentication with EAP-TLS authentication. The Cisco EAP-TLS authentication type can be configured on wireless clients that run Windows. If the wireless clients are working with other operating systems, a third-party software package must be installed to support EAP-TLS authentication. The EAP-TLS authentication type operates with a dynamic session-based WEP key. The dynamic session-based WEP key encrypts data with the key that is generated from the RADIUS authentication server or the client adapter. EAP-TLS uses Public Key Infrastructure (PKI) for encryption of data over the RF channel. You integrate the EAP-TLS authentication type with the use of Lightweight Directory Access Protocol (LDAP) for server-based authentication.
For the Network+ exam, you also need to understand Extensible Authentication Protocol − Flexible Authentication via Secure Tunneling (EAP-FAST) and Protected Extensible Authentication Protocol (PEAP). PEAP will form an encrypted TLS tunnel using a certificate on the server. After the tunnel has been formed, PEAP will authenticate the client using EAP within the outer tunnel. EAP-FAST is Cisco’s alternative to PEAP.
Why does Cisco recommend to use Wireless Client Isolation to improve security?
In addition to this feature, Cisco has also created and recommends the use of Wireless Client Isolation to improve wireless security. Wireless Client Isolation is a feature that prevents wireless clients from communicating with each other. This feature is useful when configuring a guest network or when utilizing a Bring Your Own Device (BYOD) policy, as it will increase security to limit potential threats from the various connected devices.
Does EAP-PEAP work with wireless authentication?
EAP-PEAP authentication does not work with wireless access points. EAP-PEAP works with RADIUS servers.
CISCO LEAP Authentications works with?
Cisco LEAP authentication does not work with client-side digital certificates. Both sides of the communication using Cisco LEAP share a per-session, per-user encryption key, not a digital certificate.
What typically enables a social engineering attack to occur? (Choose 2)
A) the deletion of key files
B) believable language
C) encryption
D) gullibility
Gullibility, believable language, and the good intentions of users typically enable a social engineering attack to occur. An example of a social engineering attack is an e-mail hoax, which is an e-mail message that indicates the possibility of virus infection. An e-mail hoax contains a message that uses believable language to trick users into believing the hoax. In the text of an e-mail hoax, users are typically instructed to forward the message to as many others as possible, which is how an e-mail hoax replicates. Sometimes, an e-mail hoax will direct users to delete key system files, an action that can seriously damage an operating system installation. Another bomb caused by an e-mail hoax is increased use of bandwidth, which results when users on a network forward a hoax to other users.
Social engineering attacks do not typically use encryption.
Which hacker attack can be perpetrated by hijacking a communications session between a Web browser and a Web server?
A) brute force
B) SYN attack
C) MITM
D) Ping of Death
A man-in-the-middle (MITM), or an On-Path, attack can be perpetrated by hijacking a communications session between a Web browser and a Web server. When a Web browser submits information to a Web server through a form, a hacker might be able to gain sensitive information, such as credit card numbers.
What is a brute force Attack?
A brute force attack occurs when a hacker tries every possible combination to break a code such as an encryption key or a password. A brute force attack can be used to break into a system that is secured with discretionary access lists (DACs). If a hacker identifies a valid user name and password on a DAC network, then the hacker can log in by using those credentials and can be assigned access to resources based on DAC settings.
What is a ping of death?
A Ping of Death is a denial-of-service (DoS) attack that occurs when a hacker sends multiple Internet Control Message Protocol (ICMP) messages to a network to attempt to overwhelm servers.
A SYN attack occurs when?
A SYN attack occurs when a hacker exploits the Transmission Control Protocol (TCP) triple handshake.
Which aspect of the CIA triad is best described as ensuring that data is accurate and reliable?
A) Authentication
B) Availability
C) Confidentiality
D) Integrity
Integrity is best described as ensuring that data is accurate and reliable whenever authorized parties are viewing it. Ensuring integrity guarantees that data has not been altered in any way by a malicious actor.
Describe what C is in the CIA triad model?
Confidentiality guarantees that only authorized persons can view select data. Maintaining confidentiality is critical because it ensures that proprietary information or corporate secrets are not being exposed to any unauthorized parties.
Describe what A is in the CIA triad model?
Availability ensures resources are usable when a user needs them. Maintaining availability refers to having services, applications, or technologies functioning when users need them.
Authentication is not part of the CIA triad. Authentication is the process of verifying a user’s stated identity.
Which attack involves impersonating the identity of another host to gain access to privileged resources that are typically restricted?
A) teardrop
B) spamming
C) spoofing
D) SYN flood
In a spoofing attack, which is also referred to as a masquerading attack, a person or program is able to masquerade successfully as another person or program. Spoofing refers to modifying the source IP address field in an IP datagram to imitate the IP address of a packet originating from an authorized source. This results in the target computer communicating with the attacker’s computer and providing access to restricted resources. Basically, the Internet traffic is misdirected because the DNS server is resolving the domain name to an incorrect IP address. A man-in-the-middle attack is an example of a spoofing as well as a session hijacking attack. Other types of spoofing attacks, apart from IP spoofing, are e-mail spoofing and Web spoofing. Spoofing attacks have to do with the misdirection of domain name resolution and Internet traffic.
What is a teardrop attack?
In a teardrop attack, the attacker uses a series of IP fragmented packets, causing the system to either freeze or crash while the packets are being reassembled by the victim host. A teardrop attack is primarily based on the fragmentation implementation of IP. To reassemble the fragments in the original packet at the destination, the host checks the incoming packets to ensure that they belong to the same original packet. The packets are malformed. Therefore, the process of reassembling the packets causes the system to either freeze or crash.
What is a SYN Flood attack?
In a SYN flood attack, the attacker floods the target with spoofed IP packets and causes it to either freeze or crash. The Transmission Control Protocol (TCP) uses the synchronize (SYN) and acknowledgment (ACK) packets to establish communication between two host computers. The exchange of the SYN, SYN-ACK, and ACK packets between two host computers is referred to as handshaking. The attackers flood the target computers with a series of SYN packets to which the target host computer replies. The target host computer then allocates resources to establish a connection. Because the IP address is spoofed, the target host computer never receives a valid response in the form of ACK packets from the attacking computer. When the target computer receives many such SYN packets, it runs out of resources to establish a connection with the legitimate users and becomes unreachable for processing of valid requests.
What is an Spamming attack?
A spamming attack involves flooding an e-mail server or specific e-mail addresses repeatedly with identical unwanted e-mails. Spamming is the process of using an electronic communications medium, such as e-mail, to send unsolicited messages to users in bulk. Packet filtering routers typically do not prove helpful in such attacks because the packet filtering routers do not examine the data portion of the packet. E-mail filter programs are now being embedded either in the e-mail client or in the server. E-mail filters can be configured to prevent spamming to a great extent.
You are giving a presentation about Internet browsing safety at a senior living center. The residents want to create social media accounts to keep in contact with the grandkids. Which user security concern should you emphasize?
A) Disabling unnecessary services
B) Hashing files
C) Avoiding common passwords
D) Disabling unused ports
Avoiding common passwords is critical to establishing basic security. Users should refrain from using dictionary words, names, numbers-only passwords, and keyboard patterns like qwerty. In a recent NIST study, the most secure passwords are comprised of three to four random 10+ character words, such as “ElephantInternationalConstitutionConvention.”
How can you secure a switch?
Disabling unused ports is an excellent way to secure a switch, not a user account. You should only enable designated active ports needed for network connections. As an example, if you have a 24-port switch, but only 18 of those are needed for connected hosts, you should set the status of the other six ports to “disabled.”
How can you determine a file has not been altered?
File hashing is an excellent security measure to detect whether or not a file has been intercepted and altered, but it will not secure a user account. An algorithm is used to create a unique value (hash) based on the file’s contents. The recipient of the file uses the same algorithm to generate a hash. If the two hash values match, the file has not been altered. Examples of hash algorithms include MD5, SHA1, and CRC32.
What does disabling unnecessary services do?
Disabling unnecessary services helps reduce the number of potential exploits available to an attacker. By default, Windows starts what are typically unnecessary services during bootup. As an example, you should disable FTP publishing if you do not need FTP service. You can see which services are running by going to Start > Run > Services.msc. However, disabling unnecessary services secures a client computer, not a user account.
Your company’s IT department needs to provide field engineers with remote GUI-based access to their in-office desktop PCs over the Internet. Engineers could use Windows, Linux, iOS, and Android on their remote devices with a mix of MacOS and Windows on the in-office desktops. Which of the following remote access tools offers the best no-cost option?
A) Telnet
B) VNC
C) RDC
D) ARD
E) SSH
Virtual Network Computing (VNC) is correct for many reasons. First, several VNC products are widely and freely available for Windows, OS X (MacOS), Linux, Android, iOS, and Chrome. Second, many VNC products are easy to set up and use, interoperate among multiple versions, and work well through corporate and personal firewalls. Of the items listed it is the best no-cost option.
Apple Remote Desktop is not the best option. It works best for Apple environments, such as OS X and iOS, but it does work on Windows and other platforms as well. However, ARD costs $80 per host license.
Microsoft RDC is it compatible with Linux OS?
Microsoft’s Remote Desktop Connection (RDC) is not the best option. It does not work on Linux, but runs in app form on OS X and iOS. It works as a client on all modern Windows versions back to Vista, but as a host only on Pro versions or higher (Enterprise, and Education).
Which protocol is NOT capable of preventing a man-in-the-middle attack?
A) HTTPS
B) IPSec
C) SSH
D) rsh
The remote shell (rsh) protocol is used to log on to remote computers and can be easily exploited by a man-in-the middle (MITM) attack because it neither provides encryption nor authentication of data. In a MITM attack, an intruder captures the traffic of an established connection to intercept the messages being exchanged between the sender and the receiver. The rsh protocol does not provide security because the traffic flows in clear text and not ciphertext. You can defend against a MITM attack by using strong encryption.
SSH functions?
Secure shell (SSH) provides security by authenticating before the exchange of secret keys. SSH is also known as encrypted telnet because it provides encryption of traffic exchanged between the sender and the receiver. Because encryption is used, SSH can prevent MITM attacks better than rsh can.