CISSP Domain 4 Flashcards

1
Q

What are modes vpn can operate on?

A
  • Transport : Internally, between trusted network, end to end encryption, Provides encryption only to payload
  • Tunnel : Externally , between untrusted networks, provides encryption to payload and ip sec header, link encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different protocols in IPSec ?

A

AH: Provides I, N, Provides session access control and prevents replay attacks
ESP: C, I of payload, limited authentication

Hmac for hashing

IP comp used by IP sec to compress data

Uses hybrid cryptography

IKE - To manage cryptography keys and comprise of :

OAKLEY: Key generation and exchange like D-H key exchange

SKEME: secure key exchange

ISAKMP: Organize and manage key generated by above two

Security association: Agreed on authentication and encryption used by two entities

ISAKMP is used to negotiate and provide authenticated keying material for SA in secure manner

Each IPSec vpn uses 2 SA’s

  1. One for encrypted transmission
  2. One for encrypted reception

This is what enables ipsec to support multiple simultaneous vpns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Difference between vlan and subnet ?

A

Vlan is created by switches “ Deny by default and allow by exception” whereas subnet using IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are ARP concerns mainly ARP cache poisoning ?

A

It maps ip to mac address translation

ARP cache poisoning : When IP to mac mapping needs to be done it looks at ARP cache table if it’s not there then it send broadcast.

If the owner is there in local subnet it can respond with ARP reply/response

ARP cache poisoning occurs in second step by attacker

  1. ARP graticious or unsolicited replies: Occurs without ARP asking for reply/response
  2. Static IP entries: ARP cache poisoning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Best defence against ARP concerns?

A

Port security in switch
HIDPS
ARP watch
Establish ARP static entries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are different modes wifi can be deployed?

A

Ad-hoc mode:(P2P) Without centralized control authority wireless device can communicate

Wifi direct: Upgraded version of ad hoc

Infrastructure mode: Using WAP

Standalone mode: WAP connecting using wireless instead of wire

Wired extension mode

Enterprise extended mode: Multiple WAP used and will use ESSID so that devices can connect even when WAP changes

Bridge mode: Wireless connection to link two wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are different types of wireless security?

A

IEEE802.11 uses OSA and SKA

WEP- RC4
WPA - TKIP
WPA2 and 3 - AES CCMP uses Simultaneous authentication of equals
802.1X support enterprise authentication using EAP which is a framework

WPS is in WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the ways limited radio frequencies can be managed?

Spread spectrum
FHSS
DHSS
OFDM

A

Spread spectrum: Communication occurs over multiple frequencies. Example: Message broken into pieces and sent in different frequencies

FHSS: Transmits data in series across range of frequency, but only frequency at time

DHSS: Employs frequency in parallel. Uses chipping code to allow receiver to reconstruct the data

OFDM: Does not cause interference
Employs a digital multi carrier, allows for more tightly compacted transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Blue sniffing

A

Packet capture Bluetooth focused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Blue smacking

A

DOS attack through transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Blue jacking

A

Sending unsolicited message

Annoyance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Blue snarfing

A

Unauthorised access of data

Data theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Blue bugging

A

Remote control over hardware and software if your devices by enabling microphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Difference between NFC and RFID

A

NFC few inches proximity device
RFID few feet

Both are privacy violation technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

War driving

A

To detect wireless network signals, often ones not authorised to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Evil twin

A

Acess point

Hacker operates false access points that will automatically clone or twin identity of an AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Dis-association frames and deauthentication packet

A

Both are WAP related
Dis-association frames used to disconnect from one WAP as it connects another WAP in the same ESSID network. If used maliciously client loses their wireless link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Replay attack

A

Retransmission of captured communications with hope of gaining access to targeted system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How can a screened subnet be implemented?

A

To connect untrusted to trusted network

2 firewalls or 1 multihomed firewall - 1 firewall, 1 interface to internet and 1 to screened subnet , 1 intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Collision domain vs broadcast domsin

A

Two systems transmit data at same time into single transmission path - layer 2

Single system transmits data to multiple recipient - layer 3 and above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Network access control

A

Controlling access control through strict adherence to Enforcement of security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How NAC can be implemented?

A

Pre admission philosophy: Meet all security requirements before granting access

Post admission philosophy: Allow and deny access based on user activity, pre-defined Authorization matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are agent based and agent less NAC ?

A

Agent installed for monitoring

NAC solution performs port scan and compares with baseline from NAC server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Allow listing

A

Default deny, allow by exception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Bastion host

A

Withstand attack like firewall

It’s Hardened and exposed to internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Static packet filtering firewall

A

Message header

Destination IP (layer 3) and port address (layer 4)

Stateless firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Application firewall

A

WAF
Works at layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Circuit level firewall

A

Session layer 5 protocol
Establish connection of circuit
Stateless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Stateful inspection firewall

A

Operate at layer 3 and above
Stateful
Deep packet inspection
Context analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ISFW

A

Microsegmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Proxy server and 2 types

A

Protect identity of the client internally

Forward proxy : Intermediary for queries of external sources handles query from internal clients

Reverse proxy : opp. Handles inbound query from external systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Goal of EDR

A

Detect abuses which are more advanced and cannot be detected by traditional AV program
Detect
Record
Evaluate
Respond

Caused by problematic software or users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

MDR

A

Monitor IT environment quickly detect and resolve threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

EPP

A

Predict prevent detect and respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

PPP

A

Encapsulation of IP traffic over data link layer or dial up
Allows multivendor interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

PAP and CHAP

A

Password in clear text and challenge response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

EAP

A

It’s framework rather than protocol mainly used in biometrics, tokens, Smartcards

38
Q

EAP TLS and EAP TTLS

A

Mutual authentication

Creates vpn like tunnel between end points prior to authentication

39
Q

IEEE 803.1X

A

Authentication technology
Makes port based decisions or port based network access control

It’s based on EAP

40
Q

Port security

A

Smart patch panel it’s like NAC

41
Q

VoIP communication using different phone

A

VoIP to pstn gateway to be present

42
Q

Phreaking

A

Targeted towards telephone system and voice services in general

43
Q

PBX and how to add authentication

A

Telephone switching exchange system deployed in private organisation

Direct inward system access

44
Q

Remote access techniques

A

Service specific: Email control

Remote control: Fully control physical system that is distant

Remote node operation: remote client establish connectivity to wireless, VPN

Screen scraper: screen scrapped down

2 meaning
remote access, remote control, remote desktop services

Virtual desktops or virtual apps

2 - Technology which helps automated tool to interact with HMI

45
Q

Load balancer and types

A

Used to spread or distribute network traffic load across several network links or network devices across server farm or cluster

Active -Active vs Active passive

Virtual ips Vs load persistence

46
Q

S/MIME

A

Email security solution that offers authentication (X.509 digital certificates) and confidentiality (public key encryption)

47
Q

Domain key identified mail

A

Assert valid mail is sent by an organisation through verification of domain name identity

48
Q

SPF

A

Data origin using SMTP

49
Q

Domain message authentication reporting and conformance

A

Dns based email authentication

50
Q

Starttls

A

Secure SMTP over TLS
It’s a command

51
Q

Security service provided by VPN and vpn concentrator

A

Access control, authentication, c, i
VPN example of virtualized network

Dedicated hardware to support simultaneous vpns

52
Q

Tunneling

A

Protects contents of inner protocol by encapsulation in another protocol

53
Q

Split Tunnel vs full tunnel

A

VPN internally and open internet
Both vpn enabled

54
Q

Mac flooding and fix

A

Abuse of switch by flooding of ethernet frames

The switch maintains a table called content addressable memory (CAM)

Once CAM is full older entries will be dropped and filled with false addresses causing unable to forward

Fix: MAC limiting from each jack/port

55
Q

Mac spoofing and fix

A

layer 2 can be attacked from within
Changing default mac address to some other values

56
Q

MAC cloning and fix

A

Impersonate another system

Mac filtering is a security mechanism to restrict access

Used in WAP and switches

57
Q

PAT

A

Instead of doing 1:1 map of internal clients to nat we can configure in one port

58
Q

Third party connectivity

A

MoU -reciprocal handshake agreement

ISA- Interconnection security agreement

Risk assessment

  1. Extranet
  2. Private cloud
  3. Secure file sharing
59
Q

SDN and how can you fix MITM challenge?

A

Centrally controlled

Separate control plane from the data plane

Opens up security challenges like mitm and DoS can be secured with TLS

60
Q

SD-Wan

A

Connectivity from branch offices centrally managed

Many networks can be connected- mpls, lte

Security: IP sec, vpn tunnels, ngfw, micro segmentation

61
Q

Zigbee

A

Personal area network for monitoring iot devices

During pre configuration a single key might be sent unprotected

62
Q

5 G

A

Faster speeds , lower latency
Does not rely on sim card

Stand alone version of 5 G is more secure

Old vulnerability related to 4G as it has to work

63
Q

CDN

A

Geographically distributor network

64
Q

Mesh topology

A

Redundancy

65
Q

Ring

A

Centralised

Token ring

Collision avoidance system

66
Q

Bus

A

Ethernet

Collision detection system

67
Q

Analog Vs digital

A

Wave shape

Bits electrical signal

68
Q

Synchronous Vs Asynchronous

A

Timing or clocking mechanism embedded in data stream

Stop and start, best suited for smaller amount of data example: PSTN

69
Q

Baseband vs broadband

A

Single transmission- digital signal (ethernet ) vs Multiple simultaneous signals - analog signal( TV)

70
Q

Virtual circuits

A

Logical pathway or circuit created over a packet switched network between two specific end points

71
Q

Permanent virtual circuits

A

Dedicated lease line - like walkie talkie

SVC to be created each time when needed - like frequency searching radio

72
Q

Broadcast multicast and unicast

A

Communication to all possible recipients

Multiple specific recipients

Single communication to single recipient

73
Q

PEAP

A

EAP+TLS

74
Q

LEAP

A

Cisco properiatary for wireless and ppp

75
Q

Honeypot

A

Only Enticement not entrapment

Distract from real assets and isolate until you crack them down

76
Q

Teardrop attack

A

Ddos - Fragmented packet

77
Q

Fraggle attack

A

Spoofed udp traffic

78
Q

Smurf attack

A

Spoofed ICMP traffic

79
Q

Land attack

A

Layer 4 DoS header will same

80
Q

Ping of death

A

Oversized ping packet

81
Q

Twisted pair and types

A

Twisted pair cable refers to the fact that it is a pair of wires twisted together in a specific way that creates a magnetic field, which allows the signal traveling across the wire to remain within the magnetic field. Additionally, twisted pair cable can be shielded (STP) or unshielded (UTP), with shielded twisted pair offering additional protection from cross talk and interference.

82
Q

Coaxial cable and multiplexing

A

This is the cable often used by cable companies to bring television, telephone, and high-speed internet access to homes. Coaxial cable consists of a single strand of copper wire sheathed in a protective coating, and a technology called multiplexing allows the wire to provide all the services mentioned. Multiplexing allows the information carried along the wire to be split into different frequencies, waves, and time slices at the same time, and it does so at incredible speeds.

83
Q

Data link core concepts

A

CORE CONCEPTS
Data at the Data Link layer exists as frames.
Physical addressing via MAC addresses uniquely identifies devices on a network. Two types of networks: circuit-switched and packet-switched
Common location to implement link encryption
Layer 2 devices: bridges and switches
Layer 2 protocols: L2TP, PPTP, ARP

84
Q

Authentication protocols

A

PPP

~ PAP
Chap
EAP
PEAP ~ EAP+TLS encapsulated

85
Q

What is convergence

A

Convergence refers to the ability of native IP networks to carry non-IP traffic via what are known as converged

86
Q

4 security services to secure wireless

A

To secure wireless communication, four (4) security services are required: access control, authentication, encryption, and integrity protection

87
Q

Fibre channel

A

Network data storage solutions i.e. SAN or NAS which allows high speed file transfers

88
Q

ISCSI

A

Network storage based on IP

89
Q

Difference between switch and gun

A

Switch is mainly L2 and needs port to transmit Signal whereas hub is all ports at layer 1

90
Q

WAN technologies

A

Circuit switching- Leased lines, PPP, SLIP, ISDN, DSL

Packet switching - virtual circuits
X.25 frame relay, ATM, SDLC, HDLC