Chapter 4: Securing Your Network Flashcards
What does HIDS stand for and how does it function?
Host-based Intrusion Detection System is instilled on a single host (computer, servers) or workstation and monitors all the traffic on that host including application activity. HIDSs add an extra layer of security as they can detect malware missed by antivirus software.
See page 106 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What does NIDS stand for and what is its function?
Network-based Intrusion Detection System provides overall monitoring and analysis and can detect attacks on the network.
Collectors or sensors are installed on network devices such as firewalls, routers, or switches to gather information and report to a central monitoring network appliance hosting a NIDS consol.
See page 107 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What some general shortcoming of NIDS?
NIDS are unable to detect anomalies on individual hosts unless the anomaly causes significant disturbance in network traffic. NIDS is unable to decrypt encrypted traffic, meaning NIDS can only monitor and assess threats from traffic sent in clear text or unencrypted traffic.
See page 107 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What are the differences between signature-base detection and heuristic/behavioral-based detection?
Signature-based detection uses a database of known vulnerabilities or attack patterns to detect threats or potential security events.
Heuristic-based (aka anomaly-based) detection uses performance baselines under normal operating conditions of a network to monitor for significant devotions from baseline. Heuristic-based detection can be effective at discovering zero-day attacks.
See pages 108 & 109 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What are the primary difference between an IPS and an IDS?
IPS detects threats (or an active attack) proceeds to stop them and sends an alert. IDS systems will only send an alert once a threat or an attack is detected.
IPS is considered in line (active) with traffic therefore all network traffic flows through it thereby giving it an opportunity to prevent malicious traffic. In contrast, IDS is out-of-band (passive), it monitors network traffic but the traffic does not directly flow through the IDS.
See pages 111 & 112 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What is a RAT?
RAT stands for Remote Access Trojan. Once instilled on a computer (through phishing or malware attacks) attackers can launch attacks from within a network.
See page 112 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What is a Honeypot and how is it used?
A honeypot is a server that is intentionally made easy to access or lockdown in a sloppy manner that attackers will be easily drawn to it and launch an attack. They normally hold bogus files and information to give the appearance of a live valuable server.
Honeypots are used to deceive attackers and divert them from live networks, and they allow security professionals to observe attackers and learn from their methodologies.
See page 113 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What is a Honeynet and how is it used?
A Honeynet is a group of honeypots placed in a separate network to mimic the functionality of a live network. Honeynets are accessible from an organization’s primary network.
Honeynets like honeypots are used to deceive attackers and divert them from live networks, and they allow security professionals to observe attackers and learn from their methodologies.
See page 113 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What is a Honeyfile
A Honeyfile is a file designed to attract the attention of an attacker by using a name such as password.txt (indicating a file storing credentials) that is left somewhere in the network where it is easily found.
See pages 113 & 114 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What is Fake Telemetry?
Telemetry refers to the collecting of information (statistical data and measurements) and sending it to a centralized system for processing.
Fake telemetry aims to corrupt the data sent to monitoring systems which can disrupt a system and have real-life consequences on the users supported by these systems.
See page 114 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What does WAN stand for?
WAN stands for Wide Area Network. Most vendors that manufacture wireless access point (AP) with routing capabilities (wireless routers) labels the port for internet connection as WAN.
See page 115 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What are the channels for the 2.4GHz and 5GHz based on the 802.11 standards that do not overlap? Which channel overlaps for both frequencies?
Non-overlapping channels:
2.4GHz channels: 802.11b, 802.11g
5GHz channels: 802.11ac
Overlapping channels for 2.4 and 5GHz: 802.11n
See page 116 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What is a MAC cloning attack?
MAC cloning attack aims to circumvent MAC filtering access control. MAC cloning attcaks are done by the attcker changing their MAC address to that of an authorized MAC address on the network.
See page 117 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What is a Site Survey, and what are some tools mentioned in the text that are used?
A site survey is conducted to examine the wireless environment to identify potential issues (such as noisy areas or occupied frequency bands) and areas of good connectivity.
The text mentions the use of WiFi analyzers, heat mapping, and footprinting.
See page 117 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What is a WiFi Analyzer?
WiFi analyzers are used during site surveys to identify activity on channels within the wireless spectrum and analyze activity in the 2.4GHz and 5GHz frequency range.
See page 117 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What is a Heat Map?
Heat maps are used in site surveys to provide a color-coordinated way of representing wireless signal strengths (hotspots and dead spots if they exist).
See page 117 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What is Footprinting?
Footprinting is used in site surveys to create a detailed diagram of APs, hotspots, and dead spots within an organization’s physical space. Footprinting is done by overlaying the heat map onto a basic architectural diagram of an organization’s space.
See page 118 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What is WEP and its functionality?
Wired Equivalent Privacy was a cryptographic protocol for wireless security. This protocol has since been deprecated because of known vulnerabilities.
See page 118 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What does WPA2 stand for and what is it function?
WiFi Protected Access 2 was developed to replace earlier cryptographic protocols (WEP & WPA). WPA2 (aka IEEE 802.11i) uses strong cryptographic protocols such as Advance Encryption Standard (AES) and Counter-mode/CBC-MAC Protocol (CCMP).
See page 118 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study
What are the 3 modes of WPA2 and how does each mode functions?
3 modes of WPA2:
Open - Open mode doesn’t use any security, users can simply log on to a wireless network. All data is transferred in cleartext.
Pre-shared Key (PSK) - With PSK mode users can access the wireless network anonymously with a PSK or passphrase. This does not provide authentication (authentication allows users to prove their identity with credentials).
Enterprise - With enterprise mode users are required to authenticate before gaining access to a wireless network. It uses an 802.1X server, commonly implemented as a RADIUS server, which accesses a database of accounts. Without the proper credential, access is blocked.
See page 119 of CompTIA Security+ SY0-601: Get Certified Get Ahead by Darril Gibson for an in-depth study