CS 6035 - Exam 2 Flashcards

1
Q

Packet filter firewalls can not prevent attacks that employ application-specific vulnerabilities or functions

(T/F)

A

True –> because packet filter firewalls do not examine upper-layer data, they cannot prevent attacks that employ application-specific vulnerabilities or functions.

For example, a packet filtering firewall cannot block specific application commands; if a packet filter firewall allows a given application, all functions available within the application will be permitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A firewall can protect fully against internal threats, such as a disgruntled employee or an employee who unwittingly cooperates with an external attacker.

(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A Stateful Packet Inspection Firewall only allows incoming TCP traffic to high level ports for packets which fit the profile of an entry in its directory of outbound TCP packets

(T/F)

A

True

A simple packet filtering firewall must permit inbound network traffic on all high-numbers ports for TCP-based traffic filtering. This creates a vulnerability that can be exploited by unauthorized users.

A stateful packet inspection firewall tightens up the rules for TCP traffic by creating a directory of outbound TCP connections. Incoming traffic has to fit the profile of entries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internal firewalls usually provide two-way protection for the DMZ (demilitarized zone) network system

(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A botnet attack compromises the availability of a system but not its integrity

(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is not used by packet filtering firewall rules?

  • Source or destination IP address
  • IP protocol field
  • TCP port number
  • TCP sequence number
A

TCP sequence number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A privilege - escalation exploit is malicious behavior which:

  • Operates by changing system resources such as libraries, directories, registry settings, and user accounts
  • Mails a copy of itself to address in the local system’s email address book
  • Allows the hacker to access files outside the range of which a server application would normally need to access
  • Obtains root access from a (non-root) user account
A

Obtains access from a (non-root) user account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _____ vulnerability in a Web server allows the hacker to access files outside the range of what a server application user would normally need access to.

A

directory traversal

examples of types of malicious behavior addresses by a host-based IPS (HIPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You run a network firewall for a company that handles lots of text message traffic. Spammers occasionally try to trick your systems into sending text messages for them. You notice these incoming requests always contain a spoofed address that looks like an IP address internal to your network. What is the most effective countermeasure for you to take against the spoofers.

  • Discard packets with an internal source address if that packet arrives on an internal interface
  • Change settings in the browser so that they only send requests with their own ip address as the source address
  • Modify the routers to block all external traffic
  • Discard packets with an internal source address if the packet arrives on an external interface
A

Discard packets with an internal source address if the packet arrives on an external interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are examples of attacks that can be made on packet-filtering firewalls?

  • IP address spoofing
  • Fragment attacks
  • Source routing attacks
  • All of the above
  • A & C
A

All of the above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the context of a network-based IPS (NIPS), _____ is a strategy used to identify malicious packets by scanning for attack signatures in a traffic stream, rather than individual packets.

A

Stateful matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the context of a network-based IPS (NIPS), _____ scans incoming packets for specific byte sequences (the signatures) stores in database of known attacks.

A

Pattern matching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the context of a network-based IPS (NIPS), _____ looks for deviation from standards set forth in RFCs (remote function call).

A

Protocol anomaly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the context of a network-based IPS (NIPS), _____ watches for unusual traffic activities, such as flood of UDP packets or a new service appearing on the network.

A

Traffic anomaly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In the context of a network-based IPS (NIPS), _____ develops baselines of normal traffic activity and throughput, and alerts on deviations from those baselines.

A

Statistical anomaly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A bot is a computer compromised by malware and under the control of a bot master

(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The best defense against being an unwitting participant in a DDoS attack is to prevent your system from being compromised.

(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Botnet command-and-control must be centralize, i.e., all bots communicate with a central server(s).

(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Both static and dynamic analysis are needed in order to fully understand malware behaviors.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The domain name(s) of the command and control server(s) of botnet are pre-determined for the lifetime of the bot.

(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Some API attacks last for years before they are detected.

T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

If we find that a botnet server is located in country X, we can be certain that criminals within country X control the botnet.

(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The firewall may be a single computer system or set of two or more systems that cooperate to perform the firewall function

(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A firewall can serve as the platform for IPSec.

T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A packet filtering firewall is typically configured to filter packets going in both directions. (T/F)
True
26
A prime disadvantage of an application-level gateway is additional processing overhead on each connection. (T/F)
True
27
A DMZ (demilitarized zone) is one of the internal firewalls protecting the bulk of the enterprise network. (T/F)
False | External Firewalls
28
A botnet can use ____ for command-and-control. - Email - HTTP - IRC (Internet Relay Chat) - All of the above
All of the above
29
In a ____ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system. - SYN flood - DNS amplification - Poison packet - UDP flood
DNS amplification
30
Characters of Advanced Persistent Treats (APT) include ________. - Using zero-day exploit - Low-and-slow - Targeting high-value data - All of the above
All of the above
31
The _____ defines the transport protocol. - Destination IP address - Source IP address - Interface - IP protocol field
IP protocol field
32
A _____ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host. - Packet filtering - Stateful inspection - Application-level - Circuit-level
Circuit-level
33
Typically the systems in the _____ require or foster external connectivity such as a corporate Web site, an email server, or an DNS server. - DMZ (demilitarized zone) - IP protocol field - Boundary firewall - VPN
DMZ (demilitarized zone)
34
A ____ configuration involves stand-alone firewall devices plus host-based firewall working together under a central administrative control. - Packet filtering firewall - Distributed firewall - Personal firewall - Stateful inspection firewall
Distributed firewall
35
The _____ attack is designed to circumvent filtering rules that depend on TCP header information. - tiny fragment - address spoofing - source routing - bastion host
Tiny Fragment
36
When analyzing traffic on a honeypot, care should be used in discerning legitimate traffic from potential intruders.
False. | put true --> still confusing
37
The purpose of Diffie-Hellman key exchange is to enable two users to securely reach agreement about a shared secret, that can be used as a secret key for subsequent symmetric encryption messages.
True.
38
Arranging for the sender and receiver to have the same secret key is the first requirement for digital envelope to protect a message.
False. Digital envelope allows a message to be protected without first arranging for the sender and receiver to have the same key.
39
In RSA cryptography, a public key size of 100 bits is sufficient to secure a message.
False. Currently, a 1024-bit key size is considered strong enough for virtually all applications.
40
A worm can potentially be identified through the use of anomaly detection techniques like noticing that hosts are using ports that they do not normally use.
True.
41
Compared to symmetric encryption, public-key encryption. - is more important - relies on bit operations instead of mathematical functions - is more secure from cryptanalysis - uses less computational overhead - all of the above - none of the above
None of the above.
42
X.509 certificates are not used in: - IP Security (IPSec) - Transport Layer Security (TLS) - Secure Shell (SSH) - Secure/Multi-purpose Internet Mail Extension (S/MIME) - Physical Layer Security (PLS) - None of the Above
Physical Layer Security (PLS)
43
Which of the following are algorithms that can be used in the digital signature process: 1. RSA 2. Diffie-Hellman 3. Elliptic Curve
1. RSA | 3. Elliptic Curve
44
Hash functions can be used for which of the following applications: - Message authenticity - Password security - Intrusion detection - All of the above
All of the above
45
The four major categories of Snort rule options are: 1. Sub-Data 2. Meta-Data 3. Payload 4. Non-Payload 5. Post-Detection 6. Pre-Detection
2. Meta-Data 3. Payload 4. Non-Payload 5. Post-Detection
46
Intrusion detection is based on the assumption that the behavior of the intruder differs from that can be quantified
True
47
To be of practical use an IDS (intrusion detection system) should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level.
True.
48
An inline sensor monitors a copy of network traffic; the actual traffic does not pass through the device.
False.
49
A common location for Network Intrusion Detection (NIDS) sensor is just inside the external firewall.
True
50
Network-based intrusion detection makes use of signature detection and anomaly detection.
True
51
Symmetric encryption is used primarily to provide confidentiality.
True.
52
Two of the most important applications of public-key encryption are digital signatures and key management
True.
53
The secret key is one of the inputs to a symmetric-key encryption algorithm.
True.
54
The strength of a hash function against brute-force attacks depends on the length of the hash code produced by the algorithm
True
55
Public-key algorithms are based on simple operations on bit patterns.
False.
56
A ______ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.
host-based IDS
57
______ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.
Signature detection
58
_____ involves the collection of data relating to the behavior of legitimate users over a period of time.
Anomaly detection
59
A(n) _____ is inserted into a network segment so that the traffic that is monitoring must pass through the sensor.
inline sensor
60
The _____ is the IDS component that examines the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator.
analyzer
61
On average, ______ of all possible keys must be tried in order to achieve success with a brute-force attack.
half
62
If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to _____.
use longer keys
63
_______ is a procedure that allows communicating parties to verify that received or stored messages are authentic.
message authentication
64
The purpose of a _______ is to produce a "fingerprint" of a file, message, or other block of data.
hash function
65
A _______ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
digital signature
66
A _____ applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
packet filtering firewall note: the firewall is typically configured to filter packets going in both directions (from and to the internal network)
67
A ______ is in essence an inline NIDS with the authority to modify or discard packets and tear down TCP connections
network-based IPS (intrusion protection system) As with a NIDS, a NIPS makes use of techniques used in a NIPS but not commonly found in a firewall.
68
The principle features of ____ that enables it to support these applications is that it can encrypt and/or authenticate all traffic at the IP level.
IPSec example use cases: 1. secure branch office connectivity over the internet 2. secure remote access over the internet 3. establishing extranet and intranet connectivity with partners 4. enhancing electronic commerce security
69
Symmetric encryption is also referred to as secret-key or single-key encryption (T/F)
True.
70
The ciphertext-only attack is the easiest to defend against | T/F
True Because the opponent has the least amount of information to work with.
71
A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained. (T/F)
True.
72
Advanced Encryption Standard (AES) users a Feistel structure. (T/F)
False AES uses a block length of 128 bits and a key length that can be 128, 192, or 256 bits.
73
Each block of 64 plaintext bits is encoded independently using the same key is a description of the CBC mode of operation.
False. CBC encryption algorithm is the XOR of the 64 bits of plaintext and the preceding 64 bits of cipher text.
74
Timing attacks are only applicable to RSA
False. These depend on the running time of the decryption algorithm. Applicable not just to RSA, but to other public-key cryptography systems.
75
_____ RSA attack involves trying all possible private keys
Brute force
76
_____ RSA attack, there are several different approaches, all equivalent in effort to factoring the product of two primes.
Mathematical attacks.
77
_____ RSA attack, this type of attack exploits properties of RSA algorithm.
Chosen ciphertext attacks.
78
Using PKCS (public-key cryptography standard), when RSA encrypts the same message twice, different ciphertexts will be produced.
True.
79
The Diffie-Hellman algorithm depends for its effectiveness on the difficulty of computing discrete logarithsm
True.
80
A key exchange protocol is vulnerable to a man-in-the-middle attack if it does not authenticate the participants
True
81
Just like RSA can be used for signature as well as encryption, Digital Signature Standard can also be used for encryption.
False Digital Signature Standard is a suite of algorithms that can be used to generate digital signatures.
82
In general, public key based encryption is much slower than symmetric key based encryption. (T/F)
True
83
______ is the original message or data that is fed into the encryption process as input 1. Plaintext 2. Encryption algorithm 3. Decryption algorithm 4. Ciphertext
Plaintext
84
Which of the following would allow an attack that to know the plaintext of the current message must be the same as one previously transmitted because their ciphertexts are the same. 1. CBC Cipher Block Chaining 2. ECB Electronic Code Book 3. CFB Cipher Feedback 4. OFB Output Feedback 5. CTR Counter
ECB Electronic Code Book
85
_____ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key. 1. Session Key 2. Subkey 3. Key distribution technique 4. Ciphertext key
Key distribution technique
86
Which of the following features can only be provided by publc-key cryptography?
Integrity protection
87
______ attacks have several approaches, all equivalent in effort to factoring the product of two primes. 1. Mathematical 2. Brute-force 3. Chosen cipher 4. Timing
mathematical
88
_____ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number. 1. Digital standards 2. Mathematical attacks 3. Ciphertext attacks 4. Timing attacks
Timing attacks
89
______ was the first published public-key algorithm 1. NIST 2. Diffie-Hellman 3. RC4 4. RSA
Diffie-Hellman
90
One problem inherent in public-key infrastructure (PKI) is that not all certificate authorities (CAs) are equally trustworthy. (T/F)
True.
91
A certificate authority's X.509 certificate can be used for encrypting email in addition to signing other certificates. (T/F)
False. signing executable code. An X.509 certificate contains a public key and an identity (a hostname, or an organization, or an individual), and is either signed by a certificate authority or self-signed.
92
When attacking HMAC, the attacker can generate message/code pairs offline, even though the attacker does not know K (the secret key) (T/F)
False. When attacking HMAC, the attacker cannot generate message/code pairs offline because the attacker does not know K. Therefore, the attacker must observe a sequence of messages generated by HMAC under the same key and perform the attack on these known messages.
93
A Certificate Authority's public key is not needed to verify a certificate it has issued. (T/F)
False.
94
The brute force method of attacking RSA algorithms involves trying all public keys. (T/F)
False. all private keys
95
X.509 is used in: - IP Security (IPSec) - Secure socket layer (SSL) - Secure electronic transactions (SET) - All of the above - None of the above
All of the above.
96
Kerberos makes use of a protocol that involves: - Clients - Application servers - a Kerberos server - All of the above
All of the above.
97
Which of the following is not true of the p and q in the RSA public key generation algorithm. - p cannot equal q - the value of M (the message) is not related to p and q - sign(n) is not directly dependent on p and q (only being dependent on the public key n) - the exponent e is independent of p and q - none of the above
sign(n) is not directly dependent on p and q (only being dependent on the public key n)
98
Which of the following are required to be part of a Kerberos realm? 1. The Kerberos server must share a public key with each server 2. The Kerberos server must have the user ID and password of all participating users in the database 3. All servers are registered with the Kerberos server.
2. The Kerberos server must have the user ID and password of all participating users in the database 3. All servers are registered with the Kerberos server.
99
In IPSec, packets can be protected using Encapsulating Security Payloads (ESP) or Authentication Headers (AH) but not both at the same time. (T/F)
False
100
In IPSec, if A uses Data Encryption Standard (DES) for traffic from A to B, then B must also uses DES for traffic from B to A. (T/F)
False.
101
In IPSec, the sequence number is used for preventing replay attacks. (T/F)
True.
102
Most browsers come equipped with SSL and most Web servers have implemented the protocol. (T/F)
True.
103
Even web searches have (often) been in HTTPS. | T/F
True
104
In a wireless network, traffic is broadcasted into the air, and so it is much easier to sniff wireless traffic compared with wired traffic. (T/F)
True.
105
Compared with Wired Equivalent Privacy (WEP), Wi-Fi Protected Access 2 (WPA2) has more flexible authentication and stronger encryption schemes. (T/F)
True
106
iOS has no vulnerability | T/F
False
107
In iOS, each file is encrypted using a unique, per-file key. | T/F
True
108
In iOS, an app can run its own dynamic, run-time generated code. (T/F)
False
109
The App Store review process can guarantee that no malicious iOS is allowed into the store for download. (T/F)
False.
110
In iOS, each app runs in its own sandbox | T/F
True
111
In Android, all apps have to be reviewed and signed by Google. (T/F)
False.
112
In Android, an app will never be able to get more permission than what the user has approved (T/F)
False.
113
Since Android is open-source, each handset vendor can customize it, and this is good for security
False.
114
The more complex and important part of Transport Security Layer (TLS) is the ______. - signature - message header - payload - handshake protocol
handshake protocol
115
______ is a list that contains the combinations of cryptographic algorithms supported by the client. - compression method - session ID - cipher suite - all of the above
- cipher suite
116
Encapsulating Security Payloads (ESP) supports two modes of use: transport and _____. - padding - tunnel - payload - sequence
tunnel provides confidentiality, connectionless data integrity, data-origin authentication, an anti-repay service, and limited traffic-flow confidentiality.
117
The benefit of IPSec is _______. - that it is below the transport layer and transparent to applications - there is no need to revoke keying material when users leave the organization - it can provide security for individual users if needed - all of the above
all of the above
118
The ______ field in the outer IP header indicates whether the association is an Authentication Header (AH) or Encapsulating Security Payloads (ESP) security association. - protocol identifier - security parameter index - IP destination address - sequence path counter
protocol identifier
119
A _____ is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.
SYN Flood SYN is one of 3 TCP handshakes. SYN, SYN-ACK, ACK
120
``` SYN spoofing attack targets _____. A. Email service B. TCP connection table C. DNS service D. None of the above ```
TCP connection table.
121
What is a poison packet? A. A packet that tiggers a bug in the network software and makes it crash. B. A packet that contains the signature of a virus C. A packet that infects other packets in the network buffer. D. A packet that redirects other packets to a malicious target.
A. A packet that triggers a bug in the network software and makes it crash.
122
What is a cyber slam?
A large number of queries that severely load a server.
123
If an attacker directs a large number of forged requests to a server, what type of attack is being made?
SYN spoofing
124
ICMP (Internet Control Message Protocol ) flood attacks remain common because some ICMP packets are critical to normal network behavior and cannot be filtered (T/F)
True
125
What is the difference between a TCP SYN flood attack and a SYN spoofing attack? A. There is no difference B. The difference is the volume of kacets C. SYN spoofing works with UDP only D. TCP SYN flood attakcs don't use spoofed source addresses.
Ther TCP SYN flood attacks may or may not use spoofed addresses, but the difference is in the volume of packets sent, meant to overwhelm the server. The SYN spoofing attack is meant to overwhelm the server in sending SYN-ACK messages to spoofed (preferably not invalid) addresses.
126
``` What type of attack is based on sending a large number of INVITE requests with spoofed IP addresses to a server? A. Reflection attack B. Smurf attack C. Slashdot attack D. SIP flood attack ```
SIP flood attack
127
The best defense against a reflection attack is to not allow directed broadcasts to be routed into the network (T/F)
False. The best defense against a amplification attack is to not allow directed broadcasts to be routed into the network To defend against a reflection attack, filtering to block spoofed-source packets. A reflection attack is a method of attacking a challenge-response authentication system that uses the same protocol in both directions. That is, the same challenge-response protocol is used by each side to authenticate the other side. The essential idea of the attack is to trick the target into providing the answer to its own challenge.
128
A characteristic of reflect attacks is the lack of backscatter traffic (T/F)
True.
129
What are some ways to prevent SYN spoofing attacks? A. use SYN cookies B. modify the size of the TCP connections table or timeout period C. impose rate limits on network links D. use selection or random dropping of TCP table entries. E. all of the above F. none of the above
All of the above.
130
Slowloris uses a ping flood via ICMP (Internet Control Message Protocol ) echo request packets. (T/F)
False. Smurf attack uses a ping flood via ICMP echo request packets Slowloris exploits servers that use multiple threads by sending multiple incomplete connections (by not including the terminating newline sequence) to the server.
131
In a TCP spoofing attack, attacker ideally wishes to use addresses that will not respond to the SYN-ACK with a RST. (T/F)
True
132
``` A recursive HTTP flood attack is also known as what? A. a Fraggle attack B. a Delayed Binding attack C. a Spidering attack D. a SIP flood ```
C. A spidering attack Bots start from given HTTP link and then follows all links on the provided website in a recursive way. This is also called spidering.
133
``` When is comes to defense against attacks one fo the most important principles is what? A. Authorization B. Authentication C. Defense-in-depth D. Time ```
D. Defense-in-depth
134
``` Firewalls are what type of mechanisms? A. Prevention B. Botnet C. Attack D. None of the above ```
A. Prevention
135
The firewall will enforce different security restrictions on traffic (T/F)
True
136
``` A _____ is a device that provide secure connectivity between networks. A. Enterprise intranet B. Trusted users C. Firewall D. DMZ ```
C. Firewall
137
``` Firewalls as a prevention mechanism should be designed to enforce what? A. User safety B. Security Policy C. Organizational Policy D. Public Key Infrastructure ```
B. Security Policy
138
All traffic from internal network to the internet and visa versa (external and out of the network) must pass through the firewall (T/F)
True.
139
``` A critical component of planning and implementation of firewall is specifying a suitable ____ policy? A. Security B. Access C. Network D. Directory ```
Network
140
At a high level the types of traffic that are allowed through the access policy is what? A. Address ranges (Machines, protocols, the applications and the contents) B. IPSec & TLS C. Intranet D. Defense in depth
A. Address ranges
141
Firewalls can log all traffic and can provide Network Address Translation (T/F)
True
142
What is firewall filtering? A. when policies are defined for the firewall B. authentication into the system C. means the firewall decides whether to let the traffic through or not D. means whether it will allow for a defense in depth strategy to protect the organizations digital assets
C. Firewall filtering means the firewall decides whether to let the traffic through or not
143
``` Session filtering is based on the context within a session. In order to do this a firewall maintains a session or connection and performs a ________. A. Traffic Block B. Stateful inspection C. DMZ re route D. Virtual Switch ```
B. Stateful inspection
144
In a packet filtering firewall decisions are made on a per packet basis and not by other packets. (T/F)
True
145
The packet filtering firewall applies a list of rules to match the IP or TCP header of a packet and based on the rules match the firewall and then to decide to forward or discard the packet (T/F)
True. IP or TCP header information that a firewall can use to filter a packet • Source IP address where the packets from • Destinations IP address this is the IP for the destination • Source and destination transport-level address- This defines the port number and applications such as smtp, http • IP Protocol field this defines TCP , UDP or ICMP (Internet Control Message Protocol) • Interface this is with three or more ports with which interface the packet came or where it is going to.
146
``` What policies for packet filtering firewalls are used? A. Default discard policy B. Default forward policy C. Default isolation policy D. Default write down policy ```
A. Default discard policy B. Default forward policy When there is no rule that matches the packet it will be discarded this is safe procedure but also a hindrance to users who see that some traffic isn’t allowed. Forward policy is easier to use and manage and use but less secure it just lets all packets in
147
What are the weaknesses to packet filtering? A. Limited logging functionality B. Vulnerable to attacks that take advantage of TCP/IP C. Can't prevent attacks that employ application specific vulnerabilities or functions D. Packet filter firewalls are susceptible to security breaches if improperly configured D. All of the above.
All of the above.
148
``` Packet Filtering Firewall Countermeasures are which of the following: A. IP address spoofing B. Source routing attacks C. Tiny fragment attack D. Stateful inspection attack ```
A. IP address spoofing B. Source routing attacks C. Tiny fragment attack
149
_______ countermeasure is: enforcing a rule that the first fragment of a packet must contain a predefined minimum amount of the transport header.
Tiny Fragment Attack
150
_____ countermeasure discards all packets in which the source destinations specifies to the route
Source Routing Attacks
151
______ countermeasure discards packets with an inside source address if the packet arrives on an external interface
IP Address Spoofing
152
A major component in the planning and implementation of a firewall is specifying an access policy. (T/F)
True.
153
``` A firewall access policy would use which of the following to filter traffic? A.) IP Address and Protocol values B.) Application Protocol C.) User Identity D.) Network Activity E.) All of the Above ```
E.) All of the Above
154
A web proxy is a form of application-level gateway | T/F
True.
155
Intrusion is what? A.) Any attack that aims to compromise the security goals of an Organization B.) Any attack that is hidden from a user C.) A form of detection which users are able to see everyone on the network D.) A form of encryption which allows end to end security.
A.) Any attack that aims to compromise the security goals of an Organization
156
Intrusion detection systems are part of the defense in depth strategy (T/F)
True
157
Defense in depth strategies should include the following except what? A.) Encrypting sensitive information B.) Intrusion detection systems C.) Detailed audit trails D.) Strong authentication and authorization controls E.) Zero day exploits F.) Actively management of operating systems G.) Application security
Zero day exploits. Defense in Depth (DiD) is an approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information.
158
The key design elements for an intrusion detection system is examining network and group activities (T/F)
The key design elements of an intrusion detection system is examining network and user activities
159
``` Which of the Components is not part of an Intrusion detection system? A.) Data preprocessor B.) Detection Models C.) Detection Engines D.) Decision Table E.) Reporting and Analytics F.) Decision Engine ```
E.) Reporting and Analytics
160
``` An IDS is comprised of three logical components which of the following is not a component: A.) Analyzers B.) User interface C.) Deep Learning D.) Sensors ```
C. Deep Learning Sensors are responsible for collecting data Analyzers receive input from one or more sensors or from other analyzers. The user interface to an IDS enables a user to view output from the system or control the behavior of the system.
161
In an IDS system the sensors do what? A.) Determine if an intrusion has occurred B.) Allow users to view the output of the system C.) Provide guidance about what actions to take when the intrusion occurs. D.) Collect and forward information to the analyzer
D.) Collect and forward information to the analyzer
162
Analyzers are responsible for determining if an intrusion has occurred. (T/F)
False. The analyzer output may include evidence supporting the conclusion that an intrusion occurred. The analyzer may provide guidance about what actions to take as a result of the intrusion
163
Intrusion Detection Systems are only allowed to use a single sensor. (T/F)
False. IDS can use multiple sensors across a range of host and network devices sending information to a centralized analyzer and user interface in a distributed architecture
164
Maintaining Access is backdoor that is hard to detect because it modifies machine level code (T/F)
False. Object Code Backdoors- This backdoor is hard to detect because it modifies machine code
165
The SNORT system is a signature-based NIDS. | T/F
False. The SNORT system is a rule-based NIDS. A large collection of rules exist for it to detect a wide variety of network attacks.
166
A key limitation of anomaly detection approaches used by many IDS's is that they are generally only trained with legitimate data. (T/F)
True.
167
The advantages of __________________ anomaly detection include relative simplicity and low computation cost, and lack of assumptions about behavior expected. Disadvantages include difficulty in selecting suitable metrics, and that all behaviors can't be modeled using this approach. ``` A. Statistical B. Knowledge based C. Machine-learning D. Heuristic E. Signature ```
A. Statistical
168
A key disadvantage of _______________ anomaly detection is the significant time and computational resources needed. ``` A. Statistical B. Knowledge based C. Machine-learning D. Heuristic E. Signature ```
C. Machine-learning
169
The advantages of ______________ approaches include their robustness and flexibility. A disadvantage is the difficulty and time required and the need for expert assistance. ``` A. Statistical B. Knowledge based C. Machine-learning D. Heuristic E. Signature ```
B. Knowledge based
170
Signature detection would be suitable to detect buffer overflows, password guessing, or malware transmission attacks. (T/F)
True
171
Anomaly detection would be suitable to detect policy violation attacks. (T/F)
False Signature detection is better suited.
172
Signature detection would be suitable to worm attacks. | T/F
False. Anomaly detection is better suited.
173
Anomaly detection would be suitable to detect DoS attacks. | T/F
True.
174
Signature detection would be suitable to detect network layer recon attacks, such as spoofed IP addresses or illegal IP header values. (T/F)
True.
175
Signature detection would be suitable to detect unexpected application service attacks, such as a host running an unauthorized service. (T/F)
True
176
Anomaly detection would be suitable to detect transport layer recon and attacks, such as packet fragmentation, port scanning, or SYN floods. (T/F)
False. Signature detection is better suited.
177
What is unique about Stateful Protocol Analysis? A. It is primarily used by government organizations. B. It requires less resource use than other methods C. It uses predetermined vendor supplied profiles of benign protocol traffic. D. It measures the state of the system in period time intervals to detect intruder activity.
C. It uses predetermined vendor supplied profiles of benign protocol traffic. A disadvantage is that it requires high resource use.
178
There are two schemes to attack a symmetric encryption scheme. What are they? A.) Cryptanalysis & Brute-Force attacks B.) Cryptanalysis & DDoS C.) Brute-force attack and CipherText D.) Cryptanalysis & Caesar
A.) Cryptanalysis & Brute-Force attacks
179
The most commonly used asymmetric encryption are block ciphers. They are DES, Tripe DES and AES (T/F)
False. DES, Tripe DES and AES as symmetric encryption algorithms.
180
The two categories of concern about DES fall into two categories. What are they? A.) 128 bit encryption and the algorithm itself (i.e. its cryptanalysis) B.) The Key length of 56 bits and 256 bit encryption C.) The key length of 56 bits and the cryptanalysis of the algorithm D.) All of the above
C.) The key length of 56 bits and the cryptanalysis of the algorithm
181
The main reason most companies go with 3DES is because the algorithm is relatively faster in software compared to normal DES and AES (T/F)
False. False The principal drawback of 3DES is that the algorithm is relatively sluggish in software.
182
If you want to achieve the highest level of privacy and reliability, it is often best to use a new or unpublished encryption algorithm. (T/F)
False. In practice, we should always use the widely known and deployed algorithms and standards.
183
A digital envelope is a technique for attaching a one-time key that encrypts a message to the receiver's public key. (T/F)
True
184
Symmetric Encryption relies on a public and private key meanwhile asymmetric encryption relies on a shared key between two parties. (T/F)
False
185
The primary advantage of a block cipher is that block ciphers are almost always faster and use far less code than do stream ciphers. (T/F)
False. Source: Text pg 35 Both Block Cipher and Stream Cipher are belongs to the symmetric key cipher. These two block cipher and stream cipher are the methods used for converting the plain text into cipher text. The main difference between Block cipher and Stream cipher is that block cipher converts the plain text into cipher text by taking plain text’s block at a time. While stream cipher Converts the plaint text into cipher text by taking 1 byte of plain text at a time.
186
All but one of the following situations are examples were Message Authentication confidentiality would not be preferable. Select that situation. A. When a message or notification is broadcast to many different users. B. When the receiver is expecting a message from the sender, or when both the user and sender have the same access privileges. C. When the system for either the sender or recipient are heavily loaded and cannot afford the time to encrypt. D. When authenticating a computer program, allowing it to execute without having to perform a decryption each time.
B. When the receiver is expecting a message from the sender, or when both the user and sender have the same access privileges.
187
Which of the following is not a characteristic that is sought in random (or pseudo random) numbers used in cryptography? A. The overall distribution of numbers is normal or approximately normal. B. Values are statistically independent of one another. C. The sequence is unpredictable.
A. The overall distribution of numbers is normal or approximately normal. The values should be uniformly distributed.
188
It is possible to for a computer chip to use software to generate true random numbers. (T/F)
True. The Intel DRNG, offered on multi-core chips since 2012, uses thermal noise within the silicon to output a random stream of bits.
189
So called data at rest is often not encrypted, but it should be encrypted. (T/F)
True
190
Under which of the following situations would Message Authentication confidentiality NOT be preferable? A. Encryption software is slow. B. Hash functions are irreversible C. Encryption hardware is not inexpensive. D. Encryption hardware is geared toward larger data sizes. E. Encryption algorithms may be patent protected.
B. Hash functions are irreversible
191
What are some uses of hash functions? ``` I. Message encryption II. Message authentication III. Creating Digital Signatures IV. Password encapsulation V. Intrusion detection ``` ``` A. I, II, and III B. All of the choices C. I, III, and V D. II, IV, and V E. All except I. F. All except IV. ```
E. All except I.
192
A symmetric cipher is characterized by ciphertext that is the same size as the original plaintext. (T/F)
False It can be characterized by the use of a shared secret key.
193
For applications such as file transfer, email, and database, a stream cipher may be more appropriate. (T/F)
False A block cipher may be more appropriate for applications that deal with large blocks of data. Stream ciphers may be more appropriate for data in web browsers or data communications channels.
194
A number of attacks against RC4 have been published, but if a large enough key is used, none of those attacks are practical. (T/F)
True
195
RC4 is a very fast and simple to explain, and it allows for variable key lengths. (T/F)
True
196
Which of the following is not among the ways two users can arrange to exchange keys? A. If the two parties have recently used a key, they can transmit the old key, using the new key to encrypt. B. A third party could physically deliver the key to the second party. C. If the two parties have an encrypted connection to a third party, the third party can deliver the key. D. None of the above answers are correct.
A. If the two parties have recently used a key, they can transmit the old key, using the new key to encrypt.
197
Which of the following defines a Session Key? A. A key used between entities for the purpose of distributing keys. B. A one-time key used to communicate between two end systems. C. The authority that determines which systems are allowed to communicate with each other. D. A shared key that is used in Asymmetric encryption standards such as RSA.
B. A one-time key used to communicate between two end systems.
198
How can 3DES be used to decrypt DES encrypted ciphertext? A. By setting Key1 = Key2 and Key3 = Key_DES B. By setting Key1 = Key2 = Key3 = Key_DES C. By setting Key3 = Key_DES D. By setting Key1 = Key3 and Key2 = Key_DES.
A. By setting Key1 = Key2 and Key3 = Key_DES
199
In a public-key system using RSA, you intercept the ciphertext C=10 sent to a user whose public key is e=5, n=35. What is the plaintext M (as an integer)? ``` A. 50 B 25 C. 17 D. 30 E. 5 ```
B n=35, so p = 7 and q = 5, so phi(n) = 6x4 = 24, so d = e^-1 mod phi(n) = 5, since 5x5 = 25 = 1 mod 24, M = C^d (mod N) = 10^5 mod 35 = 25
200
Consider a Diffie-Hellman scheme with a common prime q=11 and a primitive root α=2. If user A has public key YA=9, what is A’s private key XA? ``` A. 6 B. 4 C. 10 D. 5 E. 2 ```
A YA = 2^x mod 11 = 9, by inspection, 2^6 = 64 mod 11 = 9, so x = 6 = private key
201
The structure and functions used in SHA-1 and SHA-2 are substantially different from those used in SHA-3.
True
202
The CTR cipher block mode does not have which of the following advantages listed, according to the text? ``` A. Simplicity B. Preprocessing capability C. Software efficiency D. Hardware efficiency E. Scalability F. Random Access capability G. Provable Security ```
E. Scalability
203
It is possible to convert any block cipher into a stream cipher. (T/F)
True Using the Cipher Feedback Mode
204
AES is a Feistel cipher. | T/F
False
205
The primary advantage of a block cipher is that block ciphers are almost always faster than stream ciphers. (T/F)
False
206
What is the main reason 3DES uses an encrypt-decrypt-encrypt sequence? A. It makes it more difficult to crytanalyze by eavesdroppers. B. It is faster than encrypt-encrypt-encrypt would be. C. It can decrypt DES encrypted messages. D It is easier to use with cipher block chaining.
C. It can decrypt DES encrypted messages.
207
Which of the following is not a mode of operation used in Cipher blocks? ``` A. Random Bit Optimization B. Electronic Code Book C. Cipher Feedback D. Output Feedback E. Counter ```
A. Random Bit Optimization
208
Which of the following is the weakest form of attack? ``` A. Chosen Plaintext B. Chosen Ciphertext C Known Plaintext D Ciphertext Only E. Chosen Text ```
D Ciphertext Only
209
What is RC4? A. A stream cipher. B. A symmetric block cipher C An asymmetric block cipher. D. A set of standards used in Internet encryption
A. A stream cipher.
210
CTR mode is used for timing, for example, to ensure that encrypted streams remain in sync with one another. (T/F)
False. In this mode, both the sender and receiver need to access to a reliable counter, which computes a new shared value each time a ciphertext block is exchanged.
211
What operation does the Diffie-Hellman algorithm use as a one way function? A. Discrete exponentiation B. Elliptical Key Cryptography. C. Discrete logarithms D. Hashing functions.
C. Discrete logarithms
212
OCB offers Authenticated Encryption (T/F?). It used 3DES to encrypt messages. (T/F?) Its structure is similar to ECB mode, which makes it vulnerable to repeated messages. (T/F?) It uses the same key for authentication and encryption. (T/F?)
True False (OCB uses AES) False (while it's structure is similar to ECB, it uses an offset xor'ed with PT in each block) True OCB mode (Offset Codebook Mode) is an authenticated encryption mode of operation for cryptographic block ciphers.
213
The MD5 hash function, despite being susceptible to the birthday attack, is suitable for HMAC. (T/F)
True
214
RSA can be used for both encryption and key exchange, but DSS (digital signature standard) cannot. (T/F)
True
215
If someone finds an efficient way to factor large integers, then AES (advanced encryption standard) will be obsolete. (T/F)
False
216
The Certification Authority is responsible for generating the public keys. (T/F)
False
217
HMAC treats the SHA function as a black box. What benefits does this have? I. The hash algorithm used in HMAC is hidden from hackers. II. It is easy to replace the given hash function. III. HMAC code can be prepackaged and ready to use without modification. A. I and II B. I and III C. II and III D. I, II, and III
II. It is easy to replace the given hash function. | III. HMAC code can be prepackaged and ready to use without modification.
218
Using the Pigeonhole Principle, given that a hash can take an input of any size and output a value of fixed size, then it should have collisions. (T/F)
(T/F)
219
The Pigeonhole Principle can be used as a counterexample to the Collision Resistance property of hashes. (T/F)
False. While the Pigeonhole Principle says there exist collisions, the collision resistance property says that it is computationally infeasible to find them. So even though collisions exist, they are hard to find, thus keeping the collision resistance property of hashes intact.
220
From the birthday "paradox", if the length of the hash is x bits, then a hacker would have to search 2^(x/2) messages in order to find a collision. In doing so, what is the probability, approximately, that the hacker will find a collision? ``` A. nearly 100% B. about 75% C. about 66% D. about 50% E. about 25% F. less than 25% ```
D. about 50% The approximate 2^(n/2) = sqrt(2^n) gives the probability of about 50% that the hacker will find at least 1 match. So it's misleading to say that the hacker would have to search 2^(n/2) messages to "find a match". This would only give the hacker better than 50% chance of finding it without some more strategic choices.
221
SHA-1 allows message sizes as large as 2 terabytes. | T/F
True. That's quite an understatement, though. SHA-1 holds messages up to 2^64 bits, which is a (2^21)*(2^43), , so the answer is more like up to a 2 million terabytes. And SHA-384 and SHA-512 accept messages of that size squared! (2^128)
222
A truly ideal hash function should be nondeterministic. | T/F
False. You want to be able to always get the same hash for a given input, hence, it must be deterministic.
223
What is the main advantage of ECC compared to RSA? A. Its technique is not as difficult to explain. B. Hackers have not shown interest in it. C. Its theory has been around for a long time. D. It offers equal security with smaller key size.
D. It offers equal security with smaller key size. (A and B are the opposite of being true, and C is a true statement, but it's not relevant her- e.
224
Diffie-Hellman Key Exchange is, on its own, completely vulnerable to a man in the middle attack. (T/F)
True It is vulnerable because it does not authenticate the participants.
225
In attacks on RSA, it has been demonstrated that if the public key d is less than n and the private key d is less than the fourth root of n, then d can be "easily determined". (T/F)
True.
226
According to the text, the largest product of primes that has been factored to date was over 200 decimal digits long. (T/F)
True. In fact, it was 232 digits long, and that was done in late 2009.
227
All hash functions operate using these two principles: (select two) I. The size of the input is greater than the size of the output II. The input is viewed as a sequence of n-bit blocks. III. The input value is "randomized" to overcome regularities. IV. Ciphertext does not change when blocks are permuted. V. Input is processed one block at a time in an iterative fashion. ``` A. I and II B. I and III C. II and III D. II and V E. III and IV F. III and V ```
II. The input is viewed as a sequence of n-bit blocks. | V. Input is processed one block at a time in an iterative fashion.
228
SHA-512 is more efficient than SHA-256 on many 64-bit systems. (T/F)
True
229
SHA-512 makes use of constants derived from the first 64 bits of fractional parts of cube roots of the first 80 (one for each round) prime numbers. (T/F)
True
230
A longitudinal redundancy check is reasonably effective for random data as a data integrity check. It uses which bitwise function?
XOR
231
What are the principal elements of a Kerberos system? I. AS II. TGT III. TGS A. I, II, and III B. I and II only C. I and III only D. II and III only
I. AS | III. TGS
232
What of the following are steps Kerberos uses to ensure security and authentication? A. It includes a timestamp to prevent replay attacks. B. It sets a lifetime on TGTs. C. It uses short-lived authenticators encrypted with session keys. D. It encrypts the TGT with the server key to prevent alteration. E. All of the above
E. All of the above
233
What is an authenticator, as used by Kerberos? A. A software application that verifies a user's identity. B. An encrypted message which contains the ID, the address of the user, and a timestamp. C. An application that creates a one-time password that authenticates a user. D. A server which contains the IP, user ID, and user password, used for authentication. E. None of the above.
B. An encrypted message which contains the ID, the address of the user, and a timestamp.
234
The Authentication Server holds a copy of symmetric keys for all clients and servers. (T/F)
True
235
The TGT includes a key ("ticket") that gives the client access to the requested service. (T/F)
False
236
The user cannot read the TGT, she only passes it forward along with other information, to the TGS. (T/F)
True
237
The set of keys and and user ID's / passwords in a Kerberos network (i.e., a full-service Kerberos environment consisting of a Kerberos server, a number of clients, and a number of application servers) are known as ______________. ``` A. a realm. B. a session. C. a dictionary. D. an organization E. a Kerberos policy. ```
A. a realm.
238
PKI is defined as the set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates based on symmetric cryptography.
False Change symmetric to asymmetric, and it's true!
239
Which of the following is not a long-known problem with the X-509 PKI model? A. There is not a standardized set of trust stores used by all browsers and operating systems. B. The user is sometimes relied upon to make an informed decision regarding certificate trust. C. All CA's in the trust store are assumed to be equally trusted, well managed, and applying equal policies. D. The trust certificates shared in the trust store are not encrypted.
D. The trust certificates shared in the trust store are not encrypted.
240
What is a trust store? A. A database of IP addresses of known trusted servers. B. A list of CA's and their public keys. C. A CA that issues authentication certificates. D. A single internationally specified hierarchy of government regulated CAs.
B. A list of CA's and their public keys.
241
The Certification Authority is responsible for generating the public keys. (T/F)
False
242
Kerberos provides both authentication and access control. | T/F
True
243
How does Trudy, the (wo)man in the middle, initiate a mutual authentication reflection attack between two users, Bob and Alice? A. She tricks Bob into sharing Alice's public key with her. B. She tricks Bob into solving a challenge response from Alice. C. She tricks Alice into sending her challenge twice. D. She simply re-sends the challenge response that she intercepted from Alice, back to her.
B. She tricks Bob into solving a challenge response from Alice.
244
What is a major shortcoming of using a pairwise key exchange based on a shared secret (key)? A. It does not scale well. B. It lacks computational security. C. Session keys expire after a set time. D. It is vulnerable to the man in the middle attack.
A. It does not scale well.
245
In Kerberos, the localhost must store the user's password (or password hash) after retrieving the session key from the key distribution center. (T/F)
False.
246
What are some reasons a user would revoke a certificate before it expires? I. A key has been compromised. II. Upgrades require a new key. III. The key has been duplicated. ``` A. I, II, and III B. I and II only C. II and III only D. I and III only E I only ```
B. I and II only I. A key has been compromised. II. Upgrades require a new key.
247
Conventional X.509 certifications have validity periods of months to years. (T/F)
True.
248
What is the main difference between signed data and clear signed data? A. Signed data allows users without S/MIME capability to view message content, but clear signed data does not. B. Clear signed data uses base 64 encoding, signed data uses does not. C. Clear signed data is not authenticated, signed data is. D. Clear signed data allows users to use PKI, signed data requires users to apply a private key. E. None of the above are correct.
E. None of the above are correct. If you switch clear signed data and signed data in answer A, it would be correct. ; )
249
What is radix 64 encoding (aka base 64 encoding)? A. Encryption that is optimized for use with 64 bit computers. B. Encoding that uses binary logarithmic functions (radix base 2) to map input to output values. C. Encoding that maps binary data to ASCII characters. D. Encoding that encrypts a message using the receiver's 64 bit private key. E. None of the above are correct.
C. Encoding that maps binary data to ASCII characters.
250
The basic tool that permits the wide scale use of S/MIME is a pseudo random key generator. (T/F)
False The tool is a public key certificate that conforms to X509v3 standards.
251
TLS sessions avoid the need for updating security parameters for each connection. (T/F)
True
252
Why is a random parameter sent along with client_hello message during phase 1 of a TLS handshake? A. It is used as a nonce which is combined with a security key. B. It prevents an eavesdropper from replaying the message. C. It is used to to exchange a key using the Diffie-Hellman protocol. D. It is sent to confuse bots to prevent a DDoS attack. E. It is part of legacy code, sent to allow back compatibility.
B. It prevents an eavesdropper from replaying the message.
253
The Heartbleed vulnerability was due to a design flaw that was discovered in the TLS specification. (T/F)
False It was due to a programming mistake in the commonly-used OpenSSL library.
254
Which of the following statements concerning benefits of IPSec is false? A. IPSec is transparent to applications. B. No need to train users. C. IPSec can ensure that a routing update is forged. D. IPSec can ensure that a routing advertisement comes from an authorized router.
C It can ensure the update is not forged, i.e., that it is authentic.
255
When ESP is used in IPSec transport mode, the packet payload and ESP trailer are encrypted, but the ESP header is not encrypted. (T/F)
True The header gives security information such as which algorithm or secret key was used.
256
The Security Policy Database and the Security Association Database are maintained in separate tables. (T/F)
True
257
The SA is a two-way relationship between a sender and receiver, defined by IPSec parameters. (T/F)
False It is a one-way relationship -- one SA for inbound traffic, and another for outbound traffic.
258
In default mode, if a pre-shared key is compromised during phase 2 of Internet Key Exchange, then all IPSec keys previously computed are compromised. (T/F)
True If perfect forward security is required, then for each IPSec SA, the shared key along with new public components from Diffie-Hellman and new nonce values are used, protecting previously generated keys.
259
Which IPSec mode offers end-to-end security protection? ``` A. ESP Mode B. IKE Mode C. Tunnel Mode D. TLS Mode E. Transport Mode ```
E. Transport Mode
260
Multiple IPSec SAs can be established with one IKE SA. | T/F
True
261
Which is the main reason a cookie is sent during Phase 1 of IKE? A. To authenticate the users B. To store log in credentials for the session. C. To help prevent DoS attacks. D. To store header information, such as time stamp, a nonce, and the user's public key.
C. To help prevent DoS attacks.
262
Adding firewall policies to limit the scope of data and application access for all mobile devices, as well as setting up IDS and IPS configured to have tighter rules for mobile device traffic is: A. Device security B. Traffic security C. Barrier security D None of the above
C. Barrier security
263
Using Virtual Private Network(VPN) configured so that all traffic between mobile devices and the organization's network is an example of: A. Device security B. Traffic security C. Barrier security D None of the above
B. Traffic security
264
What are the main threats to wireless transmission? ``` I. Eavesdropping II. Disrupted transmissions III. Message integrity attacks IV. Signal attenuation attacks V. Masquerade channel attacks ``` ``` A. I and II B. I, III, and V C. II, III, and IV D. I, II, III, IV, and V E. none of the above ```
I. Eavesdropping II. Disrupted transmissions III. Message integrity attacks
265
The main threat to wireless access points is disruption. | T/F
The main threat is unauthorized access to the network.
266
Configuring routers to use MAC authentication will block unauthorized access to the network. (T/F)
MAC addresses can be spoofed, so this is just one element of a defense in depth strategy.