Chap 4 - Network Security Flashcards
DMZ
Demilitarized Zone
DMZ: Network buffer zone between an internal network and the Internet.
Purpose: Enhances security by isolating public services from the internal network.
Hosts: Web, email, DNS servers accessible from the Internet.
Implementation: Uses two firewalls for external and internal protection.
Benefit: Reduces risk of external attacks reaching the internal network.
Also known as a Perimeter Network or Screened Subnet
4-1: Which of the following are terms for an area of an enterprise network, separated by firewalls, which contains servers that must be accessible from both the Internet and the internal network? (Choose all that apply)
Intranet
DMZ
EGP
Stateless network
Perimeter network
Screened Subnet
DMZ
Perimeter network
Screened Subnet
EAP
EAP (Extensible Authentication Protocol)
A framework for various authentication mechanisms to secure data transmission, primarily used in network access authentication
MS-CHAPv2
MS-CHAPv2 (Microsoft Challenge Handshake Authentication Protocol version 2)
An enhanced version of CHAP developed by Microsoft. It offers improved security features and is the most common authentication method for dial-up connections.
MS-CHAPv2 is supported by modern operating systems for its security advantages over previous versions.
PAP
PAP (Password Authentication Protocol)
An authentication method that sends a username and password in plaintext over the network. This simplicity poses a security risk as it allows potential interception of the credentials
CHAP
CHAP (Challenge Handshake Authentication Protocol)
A more secure method than PAP, CHAP uses a challenge-response mechanism based on hashes of a shared secret (usually a password).
It periodically re-authenticates to prevent man-in-the-middle attacks, ensuring that the password itself is never sent over the network
4-9: Which of the follow security protocols can authenticate users without transmitting their passwords over the network?
Kerberos
802.1X
TKIP
LDAP
Kerebos
Employees a series of tickets to authenticate users and other network devices without the need to transmit credentials over the network
4-13: Which of the following terms describes a system that prevetns computers from logging on to a network unless they have the latest updates and antimalware software installed?
NAC
LDAP
RADIUS
TKIP-RC4
NAC
NAC
Network Access Control
mechanism that defines standards of equipment and configuration that systems must meet before they can connect to the network
4-14: Which of the following describes the primary difference between SSO and Same Sign-On?
- SSO enables users to access different resources with one set of credentials , whereas same sign-on requires users to have mutliple credential sets
- SSO credentials consist of one username and one password, whereas same sign-on credentials consist of one username and multiple passwords
- SSO requires the user to supply credentials only once, whereas with same sign-on, the user must supply the credentials repeatly
- SSO requires MFA, such as a password and a smartcard, whereas same sign-on requires only a password for authentication
SSO requires the user to supply credentials only once, whereas with same sign-on, the user must supply the credentials repeatly
4-17: Which of the following statements best describes the primary scenario for the use of TACACS+?
- TACACS+ was designed to provide authentication, authorization and accounting services for wireless networks
- TACACS+ was designed to provide authentication, authorization and accounting services for Active Directory services
- TACACS+ was designed to provide authentication, authorization and accounting services for remote dial-up users
- TACACS+ was designed to provide authentication, authorization and accounting services for network routers and switches
TACACS+ was designed to provide authentication, authorization and accounting services for network routers and switches
TACACS+
Terminal Access Controller Access Control System Plus
- Developed by Cisco for AAA (Authentication, Authorization, and Accounting) support.
- Designed for complex networks with many routers and switches.
- Centralizes access control for network devices.
- Separates authorization, authentication, and accounting processes for enhanced control.
- Uses TCP port 49 by default.
- Supports PAP, CHAP, MD5 hashes, and Kerberos for authentication
802.1X
- IEEE 802.1X: Standard for port-based network access control
- Provides secure authentication for devices on LAN or WLAN networks
- Uses an authentication server like RADIUS for user credential verification
- Components include client, access-point/switch, RADIUS server, and identity provider
- Ensures encrypted network access through EAP over LANs for enhanced security
- Basic implementation of NAC
4-23: Which of the following is an implementation of NAC?
RADIUS
802.1X
LDAP
TACACS+
802.1X
4-24: Which of the following is not one of the roles involved in an 802.1X transaction?
Supplicant
Authentication Server
Authorizing Agent
Authenticator
Authorizing Agent
4-25: In an 802.1X transaction, what is the function of the supplicant?
- The supplicant is the service that issues certificats to clients attempting to connect to the network
- The supplicant is the service that verifies the credentials of the client attempting to access the network
- The supplicant is the network device to which the client is attempting to connect
- The supplicant is the client user or computer attemping to connect to the network
The supplicant is the client user or computer attemping to connect to the network
4-26: In an 802.1X transaction, what is the function of the authenticator?
- The authenticator is the service that issues certificates to clients attempting to connect to the network
- The authenticator is the service that verifies the credentials of the client attempting to access the network
- The authenticator is the network device to which the client is attempting to connect
- The authenticator is the client user or computer attemping to connect to the network
The authenticator is the network device to which the client is attempting to connect
Parts of 802.1X standard
- Supplicant: client attempting to connect to the network
- Authenticator: switch or AP to which the supplicant is requesting access
- Authentication Server: typically a RADIUS implementation that verifies the supplicant’s identity
4-28: Which of the following are standards that define combined AAA services? (Choose all that apply)
802.1X
RADIUS
TACACS+
LDAP
RADIUS
TACACS+
4-30: Which of the following statements about RADIUS and TACACS+ are correct?
By default, RADIUS uses UDP, and TACACS+ uses TCP
By default, RADIUS uses TCP, and TACACS+ uses UDP
By default, both RADIUS and TACACS+ use TCP
By default, both RADIUS and TACACS+ use UDP
By default, RADIUS uses UDP, and TACACS+ uses TCP
TACACS+ port and protocol
TCP 49
4-46: Which of the following is the best description of a software product with a zero-day vulnerability?
- A product with a vulnerability that has just been addressed by a newly released fix
- A product with a vulnerability that has just been addressed by a fix, which nearly all users have applied
- A vulnerability in a newly-released product for which no fix has yet been developed
- A vulnerability in a product which no attackers have yet discovered or exploited
A vulnerability in a newly-released product for which no fix has yet been developed
Nick note: This answer is partially incorrect as a zero-day can be found in an existing product. CompTIA doesn’t know wtf they are talking about sometimes…
Defense in Depth
The use of multiple security mechanisms to provide additional protection
4-52: As a part of her company’s new risk management initative, Alice has been assigned the task of performing a threat assessment for the firm’s data resources. For each potential threat, she discovers, which of the following elements should Alice estimate? (Choose all that apply)
Severity
Mitigation
Likelihood
Posture
Severity
Likelihood
War Driving
Attack method that consists of driving around a neighborhood with a computer scanning for unprotected wireless networks
War Chalking
When a war driver locates a wireless network and marks it for other attackers
Bluesnarfing
attack in which an intruder connects to a wireless device using Bluetooth for the purpose of steeling information
Bluejacking
process of sending unsolicited messages to a device using Bluetooth
Permanent DoS
A type of DoS attack where the attacker actually damages the target system and prevents it from functioning
Amplified Dos
a DoS attack where the messages sent by the attacker required an extended amount of processing by the target server(s) increasing the burden on them more than simplier messages would
Can be mulitple attack machines, but CompTIA seems to define it as using only one
Reflective DoS
a DoS attack where the attacker sends requests containing the target server’s IP address to legitimate servers on the internet, causing them to sent a flood of responses to the target
4-63: Which of the following types of attacks require no additional hardware or software components (Choose all that apply)
Brute-force
Social Engineering
Denial-of-Service
Phishing
Brute-force
Social Engineering
Denial-of-Service
Nick: this question and answer makes no sense to me….
4-67: In which of the following ways is VLAN hopping a potential threat?
- VLAN hopping enables an attacker to scramble a switch’s patch panel connections
- VLAN hopping enables an attacker to rename the default VLAN on a switch
- VLAN hopping enables an attacker to access different VLANs using 801.2q spoofing
- VLAN hopping enables an attacker to change the native VLAN on a switch
VLAN hopping enables an attacker to access different VLANs using 801.2q spoofing
VLAN Hopping
method for sending commands to switches to transfer a port from one VLAN to another, enabling attacker to connect to a different VLAN
Smurf attack
Short: a DDoS attack in which an attacker attempts to flood a targeted server with Internet control message protocol (ICMP) packets
Long:A Smurf attack is a type of DDoS attack that exploits IP and ICMP protocols by sending ping messages with a fake IP address to create a flood of traffic, overwhelming the victim’s network.
These attacks can render networks inoperable by generating an excessive amount of traffic through IP broadcasting, leading to disruption and downtime.
Smurf attack relies on routers to forward broadcast traffic, which they no longer do, so this kind of attack is no longer an issue
4-83: Which of the following are not considered to be Denial-of-Service (DoS) attacks? (Choose all that apply)
- An intruder breaks into a company’s datacenter and smashes their web servers with a sledgehammer
- An attacker uses the ping command with the -t parameter to send a continuous stream of large ICMP packets to a server
- An attacker captures the packets transmitted to and from a domain controller to obtain encrypted passwords
- An attacker connects a rogue access point to a company’s wireless network using their SSID in the hopes of attracting their users
- An attacker captures the packets transmitted to and from a domain controller to obtain encrypted passwords
- An attacker connects a rogue access point to a company’s wireless network using their SSID in the hopes of attracting their users
4-94: Which of the following EAP variants utilize tunneling to provide security for the authentication process? (Choose all that apply)
PEAP
EAP-FAST
EAP-TLS
EAP-PSK
PEAP
EAP-FAST
PEAP
Protected Extended Authentication Protocol
encapsulates EAP inside of a TLS tunnel
EAP-FAST
Extended Authentication Protocol - Flexible Authentication via Secure Tunnel
establishes a TLS tunnel to protect user credential transmission