701 - Chapter 4 Flashcards

1
Q

What is the additional software installed on a system such as a workstation or server that monitors the host, can detect potential attacks and analyzes critical operating system files?

A

Host based intrusion detection system HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary goal of an IDS?

A

To monitor traffic and then alert administrators to suspicious activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

For HIDS, where does the traffic pass through that it is monitoring?

A

The network interface card NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In some cases, HIDS can also detect this?

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the IDS that monitors traffic on a network?

A

Network based intrusion detection system, NIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

With NIDS, what is installed on network devices such as switches, routers or firewalls? What do they do? And what do they do with the data?

A

Sensors or collectors… They gather data from the network… They report to a central monitoring network appliance hosting a NIDS console…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false NDS is able to decrypt encrypted traffic

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For NIDS, in addition to Switches, routers, firewalls…What else can be used to capture the network traffic?

A

a tap or port mirror

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two detection methods used by IDS?

A

Signature based and trend based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a signature based IDS work? And what do need to do to be continually effective?

A

They use a database of known vulnerabilities or known attack patterns… Both the signatures and antivirus definitions from the vendor need to be updated regularly to protect against current threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a trend based IDS work?

A

It starts by identifying the networks regular operation or normal behavior and create a baseline… after the baseline is established, the IDS will monitor network traffic and compare the current network behavior to its baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of IDS is effective against zero day exploits?

A

Trend based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false with a trend based detection IDS once the baseline is established, it’s good forever?

A

False… Anytime significant changes to a system or network are made that causes normal behavior to change they should re-create the baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does an IDS include to store log entries from dissimilar Systems?

A

An aggregator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can an IDS do if it detects an issue based on the rules created by the organization?

A

It can provide an alert or an alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four possible responses of an IDS to an attack or perceived attack? And which two are problematic

A

False positive, false negative, true negative, true positive… the false positive and the false negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

With an IDS, what does an administrator configure within the rules? And how do administrators configure this number with regard to false positives and false negatives?

A

A threshold… it needs to be high enough to minimize false positives, but low enough that it does not allow false negatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

And IDS is what type of control and an IPS is what type of control?

A

Detective… Preventative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are two differences between an IPS and an IDS?

A

An IPS can detect react to and prevent attacks whereas an IDS can only detect them… and IPS is in line with the network traffic, where as an IDS can only monitor the traffic using a network tap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Because an IPS is in line with traffic, it is sometime referred to as what? And an IDS which is out of band is sometimes referred to as what

A

Active and passive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Why is it important to have in some cases in IPS on the outside and on the inside of a network?

A

To protect against remote access Trojans installed internally through fishing or malware attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a device that it’s intention is to divert an attacker away from the live network?

A

A honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the two objectives of a honeypot?

A

To deceive attackers and divert them from the live network and to allow observation of an attacker and learn from there methodologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a group of honeypots called? And what does it mimic?

A

A honey net… the functionality of a live network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a file design to attract the attention of an attacker called?

A

A honey file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a fake record, inserted into a database and used to detect data theft called?

A

A honey token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is where wireless clients connect to a wired network called

A

A wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

True or false… All wireless routers are access points, but not all access points are wireless routers

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are the two primary radio bands for a wireless network?

A

2.4 GHz and 5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

With which band do wireless signals travel farthest? and which one provides the widest bandwidth?

A

2.4 and 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Wireless networks are identified by what? And why is it good practice to change its default?

A

SERVICE set identifier SSID… because the default name might indicate the type of access point it is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

True or false with a wireless network it is relatively easy for an attacker to circumvent MAC filtering?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What kind of attack is a wireless network susceptible to with regards to MAC addresses? And how does that work?

A

A MAC cloning attack also called a MAC spoofing attack… it works when the attacker changes his computers MAC address to one allowed in an authorized system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What do administrators often perform when planning and deploying a wireless network?

A

A site survey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does a site survey provide?

A

It identifies the potential problem areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What identifies an analyzes activity on channels within the wireless spectrum and allow you to analyze one frequency range at a time to see each channels activity and power levels on a graph?

A

A Wi-Fi analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

With a site survey, what tool gives you a color-coded representation of the wireless signals (which shows the wireless coverage and dead spots if they exist)?

A

A heat map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What gives you a detailed diagram of wireless access points, hotspots, and dead spots within an organization?

A

Wireless footprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the two types of antennas?

A

Omni directional and directional

40
Q

What are two wireless protocols that are deprecated and should not be used?

A

WEP and WPA

41
Q

What are the three modes in WPA2?

A

Open mode which doesn’t use any security…PSK mode Which uses a pre-shared key or passphrase also known as Wi-Fi password… enterprise mode which forces users to authenticate with unique credentials before granting access to the network

42
Q

True or false with PSK, the user is authenticated into the wireless network

A

False…It provides authorization only without authentication.

43
Q

What 802 standard is WPA2 associated with? and what 802 standard is enterprise mode associated with?

A

802.11i and 802.1x

44
Q

What does enterprise mode use to add authentication?

A

A RADIUS server

45
Q

WPA2 supports what protocol, which is based on AES?

A

CCMP… Counter-mode/CBC-MAC protocol

46
Q

WPA3 uses what instead of a pre-shared key?

A

Simultaneous authentication of equals SAE

47
Q

What are the three modes in WPA3?

A

Enhanced open mode, SAE mode, enterprise mode

48
Q

What does enhanced open mode in WPA3 offer over open mode and WPA2?

A

It uses strong encryption to protect the communication of unauthenticated users, which allows to easily run a secure guest network

49
Q

What does SAE replace?

A

It replaces PSK mode of WPA2, it uses a pass phrase, but add strong security defenses to the technology

50
Q

True or false WPA3 enterprise mode continues to use a RADIUS server and user authentication?

A

True

51
Q

What is EAP?

A

Extensible authentication protocol, it is an authentication framework

52
Q

EAP protocol provides what method for two systems to create a secure encryption key? Then uses what to encrypt all data transmitted between the devices? Does it require or support a certificate?

A

Pairwise master key PMK and pairwise transient key PTK…No

53
Q

Protected EAP, PEAP, provides an extra layer protection for EAP, what is that? Does PEAP require or support a certificate?

A

PEAP encapsulates and encrypt the EAP conversation in a TLS tunnel… PEAP requires a certificate on the server, but not on the clients

54
Q

EAP-FAST was designed by who? It supports what instead of certificates?

A

Cisco…Protected Access Credential PAC

55
Q

True or False EAP-TLS is one of the most secure EAP standards? And what is the primary difference between PEAP and EAP-TLS?

A

True…EAP-TLS require certificates on the 802.1X server and the clients (whereas PEAP only requires a certificate on the server)

56
Q

What is EAP – TTLS? And does it require certificates?

A

An extension of EAP-TLS allowing Systems to use older authentication methods within a TLS tunnel… it requires a certificate on the 802.1X server but not the clients

57
Q

Enterprise mode always requires a what?

A

An 802.1X server

58
Q

Which EAP protocol REQUIRES NO CERTIFICATES? WHICH EAP PROTOCOL REQUIRES A CERTIFICATE ON THE 802.1X SERVER ONLY? AND WHICH EAP PROTOCOL REQUIRES CERTIFICATES ON BOTH THE 802.1 X SERVER AND EACH OF THE CLIENTS?

A

EAP – FAST…PEAP and EAP-TTLS…EAP-TLS

59
Q

What does an 802.1X server provide that insures only authorized clients can connect to a device or network? And what does it prevent from connecting?

A

Port based authentication… rogue devices

60
Q

What is a technical solution that forces clients using web browsers to complete a specific process for allowing them access to the network? What is an example of this? What is this an alternative to?

A

Captive portal… a hospitals access to the Internet which forces users to agree to the terms before they can use their Wi-Fi… an 802.1x server/solution

61
Q

Which attack effectively removes a wireless client from a wireless network?

A

A disassociation attack

62
Q

What allows users to configure a wireless device by entering an eight digit pin and or pressing buttons on the device? And what attack is it vulnerable to? And what is the recommendation by security experts with regards to this?

A

WPS…brute force…disable it on all devices

63
Q

What is an access point placed with a network without official authorization called?

A

A rogue access point

64
Q

What is the unauthorized transfer of data from an organization to a location controlled by an attacker?

A

DATA exfiltration

65
Q

What is a rogue access point with the same or similar SSID as a legitimate access point called? What is an example of this?

A

An evil twin… Any place that provides free Wi-Fi can be susceptible to this kind of attack

66
Q

What can administrators use to detect rogue access points, including evil twins?

A

Wireless scanners

67
Q

What kind of attack can transmit noise or another radio signal on the same frequency used by wireless network? And what does it do to users?

A

A jamming attack… it will prevent users from connecting to the wireless network

68
Q

What are three attacks associated with an RFID?

A

Sniffing or eavesdropping… RFID cloning… A denial of service

69
Q

What is the unauthorized sending of text messages to a nearby Bluetooth device called?

A

Blue jacking

70
Q

What is the unauthorized access to or theft of information from a Bluetooth device called?

A

Blue snarfing

71
Q

Combined with blue snarfing, when an attacker installs a back door what is that called?

A

Blue bugging

72
Q

What prevents Bluetooth attacks?

A

Ensuring devices cannot be paired without manual intervention and placing them in a Faraday cage

73
Q

True or false WPA2 and WPA3 are susceptible to replay attacks

A

False, they are resistant

74
Q

Administrators use what techniques as part of a wireless audit? And what can be detected in these audits?

A

War driving… rogue access points, and unauthorized users

75
Q

What allows users to access private networks via a public network?

A

A VPN

76
Q

What is a dedicated device used for VPN that includes all the services to create a secure VPN supporting many clients?

A

VPN concentrator

77
Q

Where is a VPN concentrator typically placed in a network?

A

In the screened subnet

78
Q

What are the two modes for IP sec? What is the difference between the two?

A

Tunnel and transport… tunnel mode is used for VPN traffic and encrypts the entire packet, including the payload and the headers which include IP and MAC addresses. transport mode only encrypt the payload and is commonly used in private networks

79
Q

What is ESP? And what does it provide? And what’s its IP protocol number?

A

Encapsulating security payload… confidentiality, authentication, and integrity… 50

80
Q

Other than IP sec, what other protocol is a tunneling protocol? What is an advantage of using this protocol?

A

TLS… it uses port 443 which means the administrator most likely doesn’t have to open an additional port. It also is useful when the VPN tunnel must go through a device using NAT and IP sec is not feasible.

81
Q

What does IP sec use to authenticate clients?

A

Internet key exchange IKE over port 500

82
Q

What is the difference between a split tunnel, VPN and full tunnel VPN?

A

A full tunnel encrypt all traffic after a user has connected to a VPN while a split tunnel only encrypt traffic destined for the VPN private network

83
Q

Which VPN includes two VPN servers that act as gateways for two geographically separated networks, its main benefit is that it connects both networks without requiring additional steps on the part of the users

A

Site to Site

84
Q

What type of VPN maintains the VPN connection at all times?

A

Always on

85
Q

What is another tunneling protocol used for VPNs that does not provide encryption but instead data is encrypted with another protocol? And what is the latest version?

A

L2TP, L2TPv3

86
Q

This includes methods to inspect clients for health, such as having up-to-date antivirus software, and can restrict access of unhealthy clients to immediate to a remediation network, this can also be used for VPN clients and internal clients?

A

Network access control NAC

87
Q

What do NAC Systems use to inspect NAC clients?

A

Authentication agents, or sometimes called health agents

88
Q

What happens if a client does not meet the health conditions mandated by the NAC server?

A

The client will be directed to the remediation network, which includes resources for the client to get healthy

89
Q

True or false NAC can only inspect the health of VPN clients?

A

False… it can also be used to inspect the health of internal clients

90
Q

This type of NAC agent is installed on the client and stays on the client?

A

A permanent or persistent agent

91
Q

This type of NAC agent is downloaded and runs on the client when the client logs on remotely and then is removed after it’s use?

A

Agentless NAC also known as a dissolvable agent

92
Q

This form of VPN authentication uses a password and sends it across a network in clear text ? And what attacks is it susceptible to?

A

Password authentication protocol PAP… sniffing attacks

93
Q

This VPN authentication method is more secure than PAP because it does not send passwords over the network and clear text?

A

Challenge handshake authentication protocol CHAP

94
Q

What is a centralized authentication service that can also be used for VPN authentication? By default what does this service do with encryption?

A

Remote authentication dial in user service RADIUS… it encrypts only the password by default

95
Q

This authentication alternative to RADIUS PROVIDES TWO ESSENTIAL SECURITY BENEFITS OVER IT…WHAT IS THIS AND WHAT ARE THE TWO BENEFITS?

A

Terminal access controller access control system plus TACACS+… It encrypts the entire authentication process and it uses multiple challenges and responses between the client and the server