Chapter 2 Monitoring and Diagnosing Networks Flashcards

1
Q

Network Monitors (sniffers)

A

A machine that watches network traffic and collects data. Nowadays all you need to have is a computer with an NIC in promiscuous mode (picking up all packets that run past it).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application Log (event viewer)

A

-Events logged by applications or programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Logs (event viewer)

A
  • Successful and unsuccessful login attempts
  • Events related to creating, opening, and deleting files
  • By default, both successes and failures are not logged. You should change this.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardening

A

Locking down the operating system or your software’s code as much as you practically can

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Services

A

Programs that run on startup, and often are in the background. You should carefully disable any you don’t need.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

File and Print Server Security Risks

A
  • Very vulnerable to DoS and access attacks

- Deactivate all ports and protocols you don’t need to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Directory Sharing

A

Should be limited to what’s essential to performing system functions
-Hide root directories from browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Service Pack

A

Patches that address issues in the operating system that needed major reworking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Updates

A

General fixes with program code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security updates

A

Fix various vulnerabilities that may be found on an operating system. These should be deployed within 30 days of their release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User Account Control

A
  • Disable, but don’t delete, all unneccesary accounts
  • Pay attention not only to domain accounts, but to local accounts as well
  • Make sure set passwords meet the company’s minimum requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Principle of Least Privilege

A

Give employees access to the bare minimum of resources they need to successfully do their jobs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

802.11x

A

Use MAC Filtering and port authentication together for exponential security increase

Remember, all ports you’re not using can be a security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Posture

A

Make sure your security posture baselines are in compliance with HIPAA, ICI, or whoever is setting your standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Audits

A

Scheduled, in-depth checks of security

  • Review security logs and compliance
  • Check security device configuration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remediation Policy

A

When a security gap is found, take note of it and develop a remediation plan.

  • Sample threat classification:
    • Minor: not an immediate threat
    • Serious: Could pose a threat, but that’s very unlikely/difficult
    • Critical: It needs to be taken care of ASAP
17
Q

Alarms

A

An indication of an ongoing current problem

-Good for an issue that should be looked at right away

18
Q

Alert

A

You should pay attention to an alert, but it isn’t an indication of impending doom.

19
Q

Trends

A

Trends in threats you observe, either to your company, or to the networking world at large. These can be used to help you be proactive in your security planning.

20
Q

Enticement vs. Entrapment

A

Enticement: You lure someone into a trap you setup, like a honeypot

Entrapment: Encouraging someone to break the law and reporting them for it.

21
Q

Port 21

A

File Transfer Protocol (FTP)

22
Q

Port 22

A

SSH, SCP and SFTP

23
Q

Port 23

A

Telnet

24
Q

Port 25
Port 110
Port 143
Port 995

A

SMTP
POP3
IMAP
Secure POP3

25
Q

Port 53

A

Domain Name Services (DNS)

26
Q

Port 80

Port 443

A

Hypertext Transfer Protocol (HTTP)

Hypertext Transfer Protocol Secure (HTTPS)

27
Q

Port 161

A

Simple Network Management Protocol (SNMP)

28
Q

Port 631

A

Internet Printing Protocol (IPP)

29
Q

Port 139

A

Network Basic Input/output System (NetBIOS)

30
Q

Technical Security Controls

A

Controls implemented using systems
Operating system controls
Hardware based

31
Q

Administrative Security Controls

A

Controls that determine how people act
Security Policies
Standard operating procedures