CH.4 SECURING YOUR NETWORK Flashcards
A network administrator notices unusual traffic patterns on a local server that hosts financial data. The IDS flags the traffic as suspicious, but no alerts have been triggered previously for this activity. Which type of IDS would be best suited to detect this anomaly?
A) Signature-based IDS
B) Trend-based IDS
C) Host-based IDS
D) Passive IPS
Correct Answer: B) A trend-based IDS (anomaly-based IDS) detects suspicious activity by comparing current traffic to a baseline. This makes it ideal for identifying unusual patterns not previously seen.
A) Signature-based IDS: Requires known signatures, so it would not detect new patterns.
C) Host-based IDS: Focuses on individual hosts, not network traffic patterns.
D) Passive IPS: IPS is active, not passive, and detects attacks inline.
Which of the following devices inspects traffic and actively prevents malicious data streams from reaching the internal network?
A) Network-Based IDS (NIDS)
B) Host-Based IDS (HIDS)
C) Intrusion Prevention System (IPS)
D) Protocol Analyzer
ANSWER: C) Intrusion Prevention System (IPS)
An Intrusion Prevention System actively monitors network traffic, detects malicious activities, and takes proactive actions (such as blocking or re-routing traffic) to prevent harmful data streams from reaching the internal network.
A) Network-Based IDS (NIDS)
Only monitors and detects malicious activity but does not take proactive measures to block or prevent it.
B) Host-Based IDS (HIDS)
Focuses on detecting threats on individual hosts rather than inspecting or preventing malicious network traffic.
D) Protocol Analyzer
Primarily used for capturing and analyzing network traffic for diagnostics and troubleshooting, not for preventing malicious traffic.
An administrator is reviewing alerts from a network-based IDS and finds a significant number of false positives. What is the most likely impact of this issue on the organization’s security posture?
A) Reduced detection of actual threats
B) Increased workload for administrators
C) Network downtime
D) Higher risk of insider threats
ANSWER: B) Increased workload for administrators
A high number of false positives from a network-based IDS causes administrators to spend excessive time reviewing and addressing non-malicious alerts, which can lead to alert fatigue and reduced efficiency.
A) Reduced detection of actual threats
False positives do not directly reduce the detection of actual threats, but they may contribute indirectly by overwhelming administrators, leading to missed real threats.
C) Network downtime
False positives typically do not cause network downtime unless the IDS is improperly configured to block legitimate traffic.
D) Higher risk of insider threats
False positives are unrelated to insider threats, which involve malicious activities originating from within the organization.
Which of the following is the primary difference between an IDS and an IPS?
A) An IDS blocks malicious traffic, while an IPS does not
B) An IDS is passive, while an IPS actively blocks traffic
C) An IDS monitors local resources, while an IPS only monitors network traffic
D) An IDS operates out-of-band, while an IPS operates inline
ANSWER: B) An IDS is passive, while an IPS actively blocks traffic
An Intrusion Detection System (IDS) passively monitors network traffic and alerts administrators to potential threats but does not take action to block them. An Intrusion Prevention System (IPS), on the other hand, actively blocks or mitigates malicious traffic in real-time.
A) An IDS blocks malicious traffic, while an IPS does not
This is incorrect because IDS does not block traffic; it only detects and alerts.
C) An IDS monitors local resources, while an IPS only monitors network traffic
This is incorrect; both IDS and IPS monitor network traffic. The distinction lies in their passive or active response.
D) An IDS operates out-of-band, while an IPS operates inline
This is partially correct but does not fully capture the primary difference, which is the passive vs. active nature of their response.
An organization wants to ensure that their wireless network is not visible to casual users. Which method can the organization use to achieve this?
A) Enable WPA3 Personal Mode
B) Disable the SSID broadcast
C) Enable MAC filtering
D) Use Open Mode with encryption
ANSWER: B) Disable the SSID broadcast
Disabling the SSID (Service Set Identifier) broadcast hides the network name from being advertised, making it invisible to casual users who scan for available wireless networks.
A) Enable WPA3 Personal Mode
This provides strong encryption and authentication for securing the network but does not hide the SSID.
C) Enable MAC filtering
Restricts access to the network by allowing only devices with specified MAC addresses, but it does not hide the network from being visible.
D) Use Open Mode with encryption
This option is contradictory; Open Mode means no authentication or encryption, and it does not hide the SSID.
A network engineer is performing a site survey for a new wireless network and needs to identify potential interference. Which of the following tools would be most helpful?
A) Wi-Fi Analyzer
B) Spectrum Analyzer
C) Heat Map
D) Protocol Analyzer
ANSWER: B) Spectrum Analyzer
A Spectrum Analyzer identifies and measures radio frequency (RF) interference in the environment, which is essential for detecting potential sources of interference during a wireless site survey.
A) Wi-Fi Analyzer
Monitors wireless networks and provides information such as signal strength and channel usage but does not detect RF interference from non-Wi-Fi sources.
C) Heat Map
Displays wireless coverage and signal strength in a specific area but does not identify sources of interference.
D) Protocol Analyzer
Captures and analyzes network traffic for diagnostics and troubleshooting but is not useful for detecting RF interference.
A user reports being disconnected from the corporate wireless network multiple times during the day. Upon investigation, the security team finds that a third-party device is sending deauthentication frames to the user’s device. What type of attack is this?
A) Evil Twin
B) Jamming Attack
C) Disassociation Attack
D) Wireless Replay
ANSWER: C) Disassociation Attack
A Disassociation Attack involves sending deauthentication frames to a device, causing it to disconnect from a wireless network. This is a common attack method used to disrupt wireless connectivity.
A) Evil Twin
This attack involves creating a rogue access point that mimics a legitimate network, but it does not involve sending deauthentication frames.
B) Jamming Attack
This involves generating interference to disrupt wireless signals but does not target devices with deauthentication frames.
D) Wireless Replay
Involves capturing and replaying wireless packets to exploit vulnerabilities, but it does not involve sending deauthentication frames to force disconnections.
What is the primary security benefit of WPA3 over WPA2 in a wireless network?
A) Enhanced resistance to brute force attacks using Simultaneous Authentication of Equals (SAE)
B) Full compatibility with older devices
C) The ability to operate without encryption
D) Better resistance to initialization vector (IV) attacks
ANSWER: A) Enhanced resistance to brute force attacks using Simultaneous Authentication of Equals (SAE)
WPA3 introduces Simultaneous Authentication of Equals (SAE), which provides robust protection against brute force attacks by ensuring that a secure handshake process is used even if weak passwords are selected.
B) Full compatibility with older devices
WPA3 may not be fully compatible with older devices, as it uses advanced protocols that older devices might not support.
C) The ability to operate without encryption
This is incorrect, as WPA3 emphasizes improved encryption and security, not operating without encryption.
D) Better resistance to initialization vector (IV) attacks
IV attacks were mitigated in WPA2, and this is not a primary enhancement of WPA3. WPA3 focuses on improved password security and encryption.
An employee connects to the corporate network from a public Wi-Fi hotspot. To ensure the confidentiality of the data transmitted, which of the following solutions should be implemented?
A) Site-to-Site VPN
B) Always-On VPN with IPsec
C) Split Tunnel VPN
D) Open Mode Wi-Fi
ANSWER: B) Always-On VPN with IPsec
An Always-On VPN with IPsec ensures that all data transmitted between the employee’s device and the corporate network is encrypted, even when using public Wi-Fi, maintaining confidentiality.
A) Site-to-Site VPN
Used to connect two networks securely, but it is not designed for individual users connecting from public Wi-Fi.
C) Split Tunnel VPN
Allows some traffic to bypass the VPN, which can expose sensitive data when connected to public Wi-Fi.
D) Open Mode Wi-Fi
Offers no encryption or protection for data, making it unsuitable for maintaining confidentiality.
Which type of VPN configuration encrypts all traffic, including traffic destined for external websites, after the user connects?
A) Full Tunnel VPN
B) Split Tunnel VPN
C) Always-On VPN
D) Transport Mode VPN
ANSWER: A) Full Tunnel VPN
Full Tunnel VPN encrypts all traffic, whether destined for the corporate network or external websites, ensuring comprehensive protection.
B) Split Tunnel VPN
Encrypts only the traffic destined for the corporate network, while traffic to external websites bypasses the VPN and is not encrypted.
C) Always-On VPN
Refers to a VPN configuration that stays connected at all times, but it doesn’t necessarily imply that all traffic is encrypted. It could still be split or full tunnel based on the setup.
D) Transport Mode VPN
Encrypts only the payload of IP packets, not the entire traffic or connection. It is typically used for host-to-host communications, not for routing all traffic through a VPN.
A remote user’s VPN connection fails a health check due to an outdated antivirus definition. User is on a company owned device. Which type of network access control (NAC) solution is most likely in use?
A) Permanent Agent
B) Dissolvable Agent
C) Agentless NAC
D) Protocol Analyzer
ANSWER: A) Permanent Agent
With a company-owned device, a Permanent Agent is the most likely NAC solution in use. A permanent agent is software installed on the device that continuously enforces health policies, such as ensuring antivirus definitions are up-to-date, checking for patches, and verifying security compliance.
B) Dissolvable Agent
Installed temporarily and removed after the session, typically used for guest devices.
C) Agentless NAC
Agentless NAC is better suited for BYOD or guest devices where installing permanent software is not practical. For company-owned devices, a permanent agent provides more robust and persistent control.
D) Protocol Analyzer
Protocol analyzers are used for monitoring and troubleshooting network traffic. They do not enforce or check compliance with NAC policies.
Which of the following authentication protocols is most likely to be used in a wireless network configured with WPA3 Enterprise?
A) EAP-TLS
B) PEAP
C) EAP-TTLS
D) PAP
ANSWER: A) EAP-TLS (Extensible Authentication Protocol - Transport Layer Security)
EAP-TLS is the most likely authentication protocol used in a wireless network configured with WPA3 Enterprise. WPA3 Enterprise requires robust authentication methods, and EAP-TLS offers the highest security by using client and server certificates for mutual authentication.
B) PEAP (Protected Extensible Authentication Protocol):
PEAP encapsulates EAP inside a secure TLS tunnel and typically uses passwords for authentication. While it is secure, it is not as robust as EAP-TLS, which requires certificates.
C) EAP-TTLS (EAP Tunneled TLS):
Offers additional security layers but is not as commonly implemented as EAP-TLS for WPA3 Enterprise.
D) PAP (Password Authentication Protocol):
Transmits credentials in cleartext, making it unsuitable for secure networks like WPA3 Enterprise.
A company implements 802.1X port security to ensure that only authorized devices connect to their network. Which type of server is required to support this solution?
A) DNS
B) DHCP
C) RADIUS
D) Web Server
ANSWER: C) RADIUS
A RADIUS (Remote Authentication Dial-In User Service) server is required to support 802.1X port security, as it handles the authentication, authorization, and accounting (AAA) functions necessary to verify and allow only authorized devices to connect to the network.
A) DNS
The Domain Name System translates domain names to IP addresses but has no role in authenticating devices.
B) DHCP
The Dynamic Host Configuration Protocol assigns IP addresses to devices on a network but does not authenticate or authorize them.
D) Web Server
A web server hosts websites and web-based applications. It does not perform authentication for network devices.
Which authentication protocol sends passwords in cleartext, making it highly insecure for modern networks?
A) CHAP
B) PAP
C) EAP-TLS
D) TACACS+
ANSWER: B) PAP
Password Authentication Protocol (PAP) sends passwords in cleartext, making it vulnerable to interception.
A) CHAP
Uses a challenge-response mechanism, offering more security than PAP.
C) EAP-TLS
Employs certificates for secure authentication, not cleartext passwords.
D) TACACS+
Encrypts the entire session, including authentication credentials.
An attacker sets up an access point with a name identical to a legitimate corporate network to intercept employee credentials. What type of attack is this?
A) Rogue AP
B) Evil Twin
C) Disassociation Attack
D) Replay Attack
ANSWER: B) Evil Twin
An Evil Twin attack involves setting up an access point with the same name (SSID) as a legitimate corporate network to trick users into connecting to it. Once connected, the attacker can intercept credentials and other sensitive information.
A) Rogue AP
A rogue access point is any unauthorized AP connected to the network. While it may be malicious, it does not specifically mimic an existing legitimate network to deceive users.
C) Disassociation Attack
Forces devices off a network using deauthentication frames, unrelated to mimicking networks.
D) Replay Attack
A replay attack involves capturing and retransmitting network packets to exploit vulnerabilities. It does not involve setting up a fake network.