Chapter 2 - Monitoring & Diagnosing Networks Flashcards
Network monitors are also called what?
What do they do to your NIC?
2-46
sniffers
put it in promiscuous mode
Tell me the 2 most important logs for security purposes
2-47
application log
security log
Linux has 2 logs that are important to security. What are their names and how do they help you?
2-47
faillog - this has the failed user logins, use this when you’re looking for attempts to crack into the system.
apport.log - records application crashes, can reveal attempts to compromise the system, virus or spyware
Where do you view the event logs?
2-48
go to the Event Viewer
Your event viewer is recording logs and the maximum has been reached for space allotted for those logs. It still needs more space for the new logs. What will happen?
2-51
Older log files will be overwritten.
Explain the basic concept of “hardening”.
2-52
It means you’re doing everything you can do make your system secure. Don’t have unnecessary applications running, keep things updated, keep your user accounts secure, etc.
Why is it important to turn off the unnecessary services?
2-53
Because services can provide an attack vector.
File and Print Servers are vulnerable to what kind of attack?
What can you do to defend against this?
2-53
Denial of Service and access attacks
Only run the necessary protocols on your servers.
For a PC-based system, some attacks are targeted at NetBIOS servers. What ports will these attacks happen on?
What 2 things can you do to combat this?
If you’re on a Unix system, what port should you close?
2-53
135, 137, 138, and 139
You can disable the NetBIOS services on servers OR put a robust firewall between the server and the Internet.
111, the RPC (remote procedure call)
What is a good practice for hardening the root directories?
2-53
Keep them hidden from browsing.
Tell me 3 things you can configure from the System and Security applet in Control Panel.
2-55
Windows Firewall
automatic scans
Windows Defender
If you suspect that your workstation has been compromised, what is something in Performance Monitor that might tip you off?
2-55
look at the CPU usage
True of False: According to the book, it is better to have one role per server instead of multiple roles on one server.
2-55
True
Tell me the appropriate way to deal with patches on your machines.
2-56
Test it on one to make sure everything is okay instead of just blindly applying across the whole network at once.
There are 3 kinds of patches. Explain what they are and tell me which ones don’t need to be installed immediately.
2-57
service pack - provides new tools and extends functionality
updates - code fixes when there’s no available workaround
security updates - mandatory addressing of security vulnerability
security update is immediate. the others aren’t