Chapter 19: Protecting Your Network Flashcards

1
Q

The three goals of security, the CIA triad, are:

A
  1. Confidentiality
  2. Integrity
  3. Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ is the goal of keeping unauthorized people from accessing, seeing, reading, or interacting with systems and data.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ requires maintaining data and systems in a pristine, unaltered state when they are stored, transmitted, processed, and received, unless the alteration is intended due to normal processing.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ means ensuring that systems and data are available for authorized users to perform authorized tasks, whenever they need them.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ is a cybersecurity paradigm focused on resource protection and the premise that trust is never granted implicitly but must be continually evaluated.

A

Zero trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ acknowledges that you can’t build a completely secure perimeter, so you should design your security posture with the assumption that every single defense can be beaten.

A

Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ is about identifying how people could abuse or misuse a system, determining what access they’d need to do so, and then splitting up that access so that no individual has the ability to do it alone.

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In ____, an attacker alters a DNS server’s cache to point clients to an evil Web server instead of the correct one.

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To prevent DNS cache poisoning, the typical use case scenario is to add ____ for domain name resolutions.

A

DNSSEC or DNS Security Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is a switch process that monitors DHCP traffic, filtering out DHCP messages from untrusted sources. Typically, it’s used to block attacks that use a rogue DHCP server.

A

DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In IPv6 networks, ____ enables the switch to block router advertisements and router redirect messages that are not sent from trusted ports or don’t match a policy.

A

RA-Guard or Router Advertisement Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ attacks target ARP caches on hosts and MAC address tables on switches.

A

ARP cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What tool uses the DHCP snooping binding database to prevent ARP cache poisoning?

A

DAI or Dynamic ARP Inspection (Cisco)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Implementing Dynamic ARP Inspection (DAI) and DHCP snooping enhances ____, a key network hardening technique.

A

switch port protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ____ attack is a targeted attack on a server (or servers) that provides some form of service on the Internet with the goal of making that service unable to process any incoming requests.

A

DoS or Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used in DDoS attacks, ____ is where the attacker sends requests to normal servers with the target’s IP address spoofed as the source. The normal servers respond to the spoofed IP address (the target system), overwhelming it with reflected traffic without identifying the true initiator.

A

reflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A/An ____ DoS attack sends a small amount of traffic to a server, which produces a much larger response from the server that is sent to a spoofed IP address, overwhelming a victim machine.

A

amplified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A/An ____ is a form of DoS attack that targets 802.11 WiFi networks specifically by sending out a frame that kicks a wireless client off its current WAP connection. A rogue WAP nearby presents a stronger signal, which the client will prefer. The rogue WAP connects the client to the Internet and then proceeds to intercept communications to and from that client.

A

deauthentication (deauth) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A/An ____ attack is where an attacker takes advantage of DHCP scope exhaustion by spoofing packets to the DHCP server, tricking it into giving away all of its leases and therefore running out of open addresses. It is a technique used to encourage clients to switch to a rogue DHCP server that the attacker controls.

A

DHCP starvation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In an ____, an attacker taps into the communications between two systems, covertly intercepting traffic thought to be only between those systems, reading or in some cases even changing the data and then sending the data on.

A

on-path attack (aka. man-in-the-middle)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

____ tries to intercept a valid computer session to get authentication information.

A

Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

____ is an attack where a threat agent guesses every permutation of some part of data.

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A/An ____ uses a list of known words and partial words as the starting point for cracking passwords.

A

dictionary attack

24
Q

____ is a Layer 2 attack that enables an attacker to access hosts on a VLAN the attacker is not a part of. The mechanism behind the attack is to take a system that’s connected to one VLAN and, by abusing VLAN commands to the switch, convince the switch to change your switch port connection to a trunk line.

A

VLAN hopping

25
Q

The term ____ describes any program or code (macro, script, and so on) that’s designed to do something on a system or network that you don’t want to have happen.

A

malware

26
Q

____ uses some form of encryption to lock a user out of a system, usually by encrypting the boot drive.

A

Crypto-malware

27
Q

____ is any form of malware the makes you pay to get the malware to go away.

A

Ransomware

28
Q

A ____ is a malware program that replicates and activates. It only replicates to other applications on a drive or to other drives and does not replicate across networks. It is not a stand-alone program, but rather something attached to a host file. They carry some payload that may or may not do something malicious when activated.

A

virus

29
Q

A/An ____ replicates exclusively through networks by sending copies of itself to any other computers it can locate on the network. They can exploit inherent vulnerabilities in program code, attacking programs, operating systems, protocols, and more.

A

worm

30
Q

A/An ____ is code written to execute when certain conditions are met, usually with malicious intent.

A

logic bomb

31
Q

A/An ____ is a piece of malware that looks or pretends to do one thing while, at the same time, doing something evil. They do not replicate.

A

Trojan horse

32
Q

A/An ____ is a type of malware that takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools.

A

rootkit

33
Q

____ is a program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements.

A

Adware

34
Q

____ is a function of any program that sends information about your system or your actions over the Internet. The type of information sent depends on the program.

A

Spyware

35
Q

____ is the process of using or manipulating people inside the networking environment to gain access to that network from the outside.

A

Social engineering

36
Q

____ is a social engineering technique where the attacker poses as a trusted source and tries to inspire the victim to act based on a false premise (usually communicated via e-mail, phone, or SMS). A successful attack typically obtains confidential information or introduces malware into the network.

A

Phishing

37
Q

To lock a Windows computer, press the ____ combination.

A

WINDOWS KEY-L

38
Q

An unauthorized person attempting to follow an authorized person into a secure area without the authorized person’s consent or even realization is called ____.

A

tailgating

39
Q

An authorized person helping an unauthorized person follow them into a secure area is called ____.

A

piggybacking

40
Q

A/An ____, is an entryway with two successive locked doors and a small space between them providing one-way entry or exit.

A

access control vestibule (aka. mantrap)

41
Q

A/An ____ is a sensor that detects and reads a token that comes within range. The polled information is used to determine the access level of the person carrying the token.

A

proximity reader

42
Q

A device (such as a credit card) that you insert into your PC or use on a door pad for authentication is called a/an ____.

A

smart card

43
Q

A/An ____ is a door unlocking system that uses a door handle, a latch, and a sequence of mechanical push buttons.

A

cipher lock

44
Q

In all network operating systems, the permissions of the groups are combined, and the result is what is called the ____ the user has to access a given resource.

A

effective permissions

45
Q

____ is a standardized approach to verify that a node meets certain criteria before it is allowed to connect to a network.

A

NAC or Network Access Control

46
Q

In terms of posture assessment, a/an ____ refers to software that runs within a client and reports the client’s security characteristics to an access control server to be approved or denied entry to a system.

A

agent

47
Q

Attackers can use ____, excessive or malformed packets, to conduct DoS attacks on networks and hosts, targeting vulnerable switches through their switch ports.

A

traffic floods

48
Q

Better switches today employ ____ to detect and block excessive traffic. This enhances switch port protection.

A

flood guards

49
Q

A/An ____ is the code pattern of a known virus.

A

signature

50
Q

____ are a network security device or software that restricts incoming and outgoing network traffic based on pre-defined rules.

A

Firewalls

51
Q

A/An ____ is a network segment carved out by firewalls to provide a special place (a zone) on the network for any servers that need to be publicly accessible from the Internet.

A

screened subnet (aka. a DMZ or demilitarized zone)

52
Q

A/An ____ is a resource that an administrator sets up for the express purpose of attracting a computer hacker, often using fake data and deliberate vulnerabilities as bait. If a hacker takes the bait, the network’s important resources are unharmed and the network personnel can analyze the attack to predict and protect against future attacks, making the network more secure.

A

honeypot

53
Q

A/An ____ is a network containing one or more honeypots created to lure in hackers.

A

honeynet

54
Q

A computer compromised with malware to support a botnet is called a ____.

A

zombie

55
Q

Which Windows utility displays open ports on a host?

A

netstat

56
Q

The NSA’s TEMPEST security standards are used to combat which risk?

A

RF emanation using enclosures, shielding, and even paint.

57
Q

A DoS attacker using ____ would focus on sending the smallest amount of traffic possible.

A

amplification