CS 6035 - Exam 2 Flashcards
Packet filter firewalls can not prevent attacks that employ application-specific vulnerabilities or functions
(T/F)
True –> because packet filter firewalls do not examine upper-layer data, they cannot prevent attacks that employ application-specific vulnerabilities or functions.
For example, a packet filtering firewall cannot block specific application commands; if a packet filter firewall allows a given application, all functions available within the application will be permitted
A firewall can protect fully against internal threats, such as a disgruntled employee or an employee who unwittingly cooperates with an external attacker.
(T/F)
False
A Stateful Packet Inspection Firewall only allows incoming TCP traffic to high level ports for packets which fit the profile of an entry in its directory of outbound TCP packets
(T/F)
True
A simple packet filtering firewall must permit inbound network traffic on all high-numbers ports for TCP-based traffic filtering. This creates a vulnerability that can be exploited by unauthorized users.
A stateful packet inspection firewall tightens up the rules for TCP traffic by creating a directory of outbound TCP connections. Incoming traffic has to fit the profile of entries.
Internal firewalls usually provide two-way protection for the DMZ (demilitarized zone) network system
(T/F)
True
A botnet attack compromises the availability of a system but not its integrity
(T/F)
False
Which of the following is not used by packet filtering firewall rules?
- Source or destination IP address
- IP protocol field
- TCP port number
- TCP sequence number
TCP sequence number
A privilege - escalation exploit is malicious behavior which:
- Operates by changing system resources such as libraries, directories, registry settings, and user accounts
- Mails a copy of itself to address in the local system’s email address book
- Allows the hacker to access files outside the range of which a server application would normally need to access
- Obtains root access from a (non-root) user account
Obtains access from a (non-root) user account
A _____ vulnerability in a Web server allows the hacker to access files outside the range of what a server application user would normally need access to.
directory traversal
examples of types of malicious behavior addresses by a host-based IPS (HIPS)
You run a network firewall for a company that handles lots of text message traffic. Spammers occasionally try to trick your systems into sending text messages for them. You notice these incoming requests always contain a spoofed address that looks like an IP address internal to your network. What is the most effective countermeasure for you to take against the spoofers.
- Discard packets with an internal source address if that packet arrives on an internal interface
- Change settings in the browser so that they only send requests with their own ip address as the source address
- Modify the routers to block all external traffic
- Discard packets with an internal source address if the packet arrives on an external interface
Discard packets with an internal source address if the packet arrives on an external interface
Which of the following are examples of attacks that can be made on packet-filtering firewalls?
- IP address spoofing
- Fragment attacks
- Source routing attacks
- All of the above
- A & C
All of the above.
In the context of a network-based IPS (NIPS), _____ is a strategy used to identify malicious packets by scanning for attack signatures in a traffic stream, rather than individual packets.
Stateful matching
In the context of a network-based IPS (NIPS), _____ scans incoming packets for specific byte sequences (the signatures) stores in database of known attacks.
Pattern matching
In the context of a network-based IPS (NIPS), _____ looks for deviation from standards set forth in RFCs (remote function call).
Protocol anomaly
In the context of a network-based IPS (NIPS), _____ watches for unusual traffic activities, such as flood of UDP packets or a new service appearing on the network.
Traffic anomaly
In the context of a network-based IPS (NIPS), _____ develops baselines of normal traffic activity and throughput, and alerts on deviations from those baselines.
Statistical anomaly.
A bot is a computer compromised by malware and under the control of a bot master
(T/F)
True
The best defense against being an unwitting participant in a DDoS attack is to prevent your system from being compromised.
(T/F)
True
Botnet command-and-control must be centralize, i.e., all bots communicate with a central server(s).
(T/F)
False
Both static and dynamic analysis are needed in order to fully understand malware behaviors.
True
The domain name(s) of the command and control server(s) of botnet are pre-determined for the lifetime of the bot.
(T/F)
False
Some API attacks last for years before they are detected.
T/F
True
If we find that a botnet server is located in country X, we can be certain that criminals within country X control the botnet.
(T/F)
False
The firewall may be a single computer system or set of two or more systems that cooperate to perform the firewall function
(T/F)
True
A firewall can serve as the platform for IPSec.
T/F
True
A packet filtering firewall is typically configured to filter packets going in both directions.
(T/F)
True
A prime disadvantage of an application-level gateway is additional processing overhead on each connection.
(T/F)
True
A DMZ (demilitarized zone) is one of the internal firewalls protecting the bulk of the enterprise network.
(T/F)
False
External Firewalls
A botnet can use ____ for command-and-control.
- HTTP
- IRC (Internet Relay Chat)
- All of the above
All of the above
In a ____ attack the attacker creates a series of DNS requests containing the spoofed source address for the target system.
- SYN flood
- DNS amplification
- Poison packet
- UDP flood
DNS amplification
Characters of Advanced Persistent Treats (APT) include ________.
- Using zero-day exploit
- Low-and-slow
- Targeting high-value data
- All of the above
All of the above
The _____ defines the transport protocol.
- Destination IP address
- Source IP address
- Interface
- IP protocol field
IP protocol field
A _____ gateway sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host.
- Packet filtering
- Stateful inspection
- Application-level
- Circuit-level
Circuit-level
Typically the systems in the _____ require or foster external connectivity such as a corporate Web site, an email server, or an DNS server.
- DMZ (demilitarized zone)
- IP protocol field
- Boundary firewall
- VPN
DMZ (demilitarized zone)
A ____ configuration involves stand-alone firewall devices plus host-based firewall working together under a central administrative control.
- Packet filtering firewall
- Distributed firewall
- Personal firewall
- Stateful inspection firewall
Distributed firewall
The _____ attack is designed to circumvent filtering rules that depend on TCP header information.
- tiny fragment
- address spoofing
- source routing
- bastion host
Tiny Fragment
When analyzing traffic on a honeypot, care should be used in discerning legitimate traffic from potential intruders.
False.
put true –> still confusing
The purpose of Diffie-Hellman key exchange is to enable two users to securely reach agreement about a shared secret, that can be used as a secret key for subsequent symmetric encryption messages.
True.
Arranging for the sender and receiver to have the same secret key is the first requirement for digital envelope to protect a message.
False.
Digital envelope allows a message to be protected without first arranging for the sender and receiver to have the same key.
In RSA cryptography, a public key size of 100 bits is sufficient to secure a message.
False.
Currently, a 1024-bit key size is considered strong enough for virtually all applications.
A worm can potentially be identified through the use of anomaly detection techniques like noticing that hosts are using ports that they do not normally use.
True.
Compared to symmetric encryption, public-key encryption.
- is more important
- relies on bit operations instead of mathematical functions
- is more secure from cryptanalysis
- uses less computational overhead
- all of the above
- none of the above
None of the above.
X.509 certificates are not used in:
- IP Security (IPSec)
- Transport Layer Security (TLS)
- Secure Shell (SSH)
- Secure/Multi-purpose Internet Mail Extension (S/MIME)
- Physical Layer Security (PLS)
- None of the Above
Physical Layer Security (PLS)
Which of the following are algorithms that can be used in the digital signature process:
- RSA
- Diffie-Hellman
- Elliptic Curve
- RSA
3. Elliptic Curve
Hash functions can be used for which of the following applications:
- Message authenticity
- Password security
- Intrusion detection
- All of the above
All of the above
The four major categories of Snort rule options are:
- Sub-Data
- Meta-Data
- Payload
- Non-Payload
- Post-Detection
- Pre-Detection
- Meta-Data
- Payload
- Non-Payload
- Post-Detection
Intrusion detection is based on the assumption that the behavior of the intruder differs from that can be quantified
True
To be of practical use an IDS (intrusion detection system) should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level.
True.
An inline sensor monitors a copy of network traffic; the actual traffic does not pass through the device.
False.
A common location for Network Intrusion Detection (NIDS) sensor is just inside the external firewall.
True
Network-based intrusion detection makes use of signature detection and anomaly detection.
True
Symmetric encryption is used primarily to provide confidentiality.
True.
Two of the most important applications of public-key encryption are digital signatures and key management
True.
The secret key is one of the inputs to a symmetric-key encryption algorithm.
True.
The strength of a hash function against brute-force attacks depends on the length of the hash code produced by the algorithm
True
Public-key algorithms are based on simple operations on bit patterns.
False.
A ______ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.
host-based IDS
______ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.
Signature detection
_____ involves the collection of data relating to the behavior of legitimate users over a period of time.
Anomaly detection
A(n) _____ is inserted into a network segment so that the traffic that is monitoring must pass through the sensor.
inline sensor
The _____ is the IDS component that examines the data collected by the sensor for signs of unauthorized or undesired activity or for events that might be of interest to the security administrator.
analyzer
On average, ______ of all possible keys must be tried in order to achieve success with a brute-force attack.
half
If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to _____.
use longer keys
_______ is a procedure that allows communicating parties to verify that received or stored messages are authentic.
message authentication
The purpose of a _______ is to produce a “fingerprint” of a file, message, or other block of data.
hash function
A _______ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
digital signature
A _____ applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet.
packet filtering firewall
note: the firewall is typically configured to filter packets going in both directions (from and to the internal network)
A ______ is in essence an inline NIDS with the authority to modify or discard packets and tear down TCP connections
network-based IPS (intrusion protection system)
As with a NIDS, a NIPS makes use of techniques used in a NIPS but not commonly found in a firewall.
The principle features of ____ that enables it to support these applications is that it can encrypt and/or authenticate all traffic at the IP level.
IPSec
example use cases:
- secure branch office connectivity over the internet
- secure remote access over the internet
- establishing extranet and intranet connectivity with partners
- enhancing electronic commerce security
Symmetric encryption is also referred to as secret-key or single-key encryption
(T/F)
True.
The ciphertext-only attack is the easiest to defend against
T/F
True
Because the opponent has the least amount of information to work with.
A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.
(T/F)
True.
Advanced Encryption Standard (AES) users a Feistel structure.
(T/F)
False
AES uses a block length of 128 bits and a key length that can be 128, 192, or 256 bits.
Each block of 64 plaintext bits is encoded independently using the same key is a description of the CBC mode of operation.
False.
CBC encryption algorithm is the XOR of the 64 bits of plaintext and the preceding 64 bits of cipher text.
Timing attacks are only applicable to RSA
False.
These depend on the running time of the decryption algorithm.
Applicable not just to RSA, but to other public-key cryptography systems.
_____ RSA attack involves trying all possible private keys
Brute force
_____ RSA attack, there are several different approaches, all equivalent in effort to factoring the product of two primes.
Mathematical attacks.
_____ RSA attack, this type of attack exploits properties of RSA algorithm.
Chosen ciphertext attacks.
Using PKCS (public-key cryptography standard), when RSA encrypts the same message twice, different ciphertexts will be produced.
True.
The Diffie-Hellman algorithm depends for its effectiveness on the difficulty of computing discrete logarithsm
True.
A key exchange protocol is vulnerable to a man-in-the-middle attack if it does not authenticate the participants
True
Just like RSA can be used for signature as well as encryption, Digital Signature Standard can also be used for encryption.
False
Digital Signature Standard is a suite of algorithms that can be used to generate digital signatures.
In general, public key based encryption is much slower than symmetric key based encryption.
(T/F)
True
______ is the original message or data that is fed into the encryption process as input
- Plaintext
- Encryption algorithm
- Decryption algorithm
- Ciphertext
Plaintext
Which of the following would allow an attack that to know the plaintext of the current message must be the same as one previously transmitted because their ciphertexts are the same.
- CBC Cipher Block Chaining
- ECB Electronic Code Book
- CFB Cipher Feedback
- OFB Output Feedback
- CTR Counter
ECB Electronic Code Book
_____ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.
- Session Key
- Subkey
- Key distribution technique
- Ciphertext key
Key distribution technique
Which of the following features can only be provided by publc-key cryptography?
Integrity protection
______ attacks have several approaches, all equivalent in effort to factoring the product of two primes.
- Mathematical
- Brute-force
- Chosen cipher
- Timing
mathematical
_____ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.
- Digital standards
- Mathematical attacks
- Ciphertext attacks
- Timing attacks
Timing attacks
______ was the first published public-key algorithm
- NIST
- Diffie-Hellman
- RC4
- RSA
Diffie-Hellman
One problem inherent in public-key infrastructure (PKI) is that not all certificate authorities (CAs) are equally trustworthy.
(T/F)
True.
A certificate authority’s X.509 certificate can be used for encrypting email in addition to signing other certificates.
(T/F)
False.
signing executable code. An X.509 certificate contains a public key and an identity (a hostname, or an organization, or an individual), and is either signed by a certificate authority or self-signed.
When attacking HMAC, the attacker can generate message/code pairs offline, even though the attacker does not know K (the secret key)
(T/F)
False.
When attacking HMAC, the attacker cannot generate message/code pairs offline because the attacker does not know K. Therefore, the attacker must observe a sequence of messages generated by HMAC under the same key and perform the attack on these known messages.
A Certificate Authority’s public key is not needed to verify a certificate it has issued.
(T/F)
False.
The brute force method of attacking RSA algorithms involves trying all public keys.
(T/F)
False.
all private keys
X.509 is used in:
- IP Security (IPSec)
- Secure socket layer (SSL)
- Secure electronic transactions (SET)
- All of the above
- None of the above
All of the above.
Kerberos makes use of a protocol that involves:
- Clients
- Application servers
- a Kerberos server
- All of the above
All of the above.
Which of the following is not true of the p and q in the RSA public key generation algorithm.
- p cannot equal q
- the value of M (the message) is not related to p and q
- sign(n) is not directly dependent on p and q (only being dependent on the public key n)
- the exponent e is independent of p and q
- none of the above
sign(n) is not directly dependent on p and q (only being dependent on the public key n)
Which of the following are required to be part of a Kerberos realm?
- The Kerberos server must share a public key with each server
- The Kerberos server must have the user ID and password of all participating users in the database
- All servers are registered with the Kerberos server.
- The Kerberos server must have the user ID and password of all participating users in the database
- All servers are registered with the Kerberos server.
In IPSec, packets can be protected using Encapsulating Security Payloads (ESP) or Authentication Headers (AH) but not both at the same time.
(T/F)
False
In IPSec, if A uses Data Encryption Standard (DES) for traffic from A to B, then B must also uses DES for traffic from B to A.
(T/F)
False.
In IPSec, the sequence number is used for preventing replay attacks.
(T/F)
True.
Most browsers come equipped with SSL and most Web servers have implemented the protocol.
(T/F)
True.
Even web searches have (often) been in HTTPS.
T/F
True
In a wireless network, traffic is broadcasted into the air, and so it is much easier to sniff wireless traffic compared with wired traffic.
(T/F)
True.
Compared with Wired Equivalent Privacy (WEP), Wi-Fi Protected Access 2 (WPA2) has more flexible authentication and stronger encryption schemes.
(T/F)
True
iOS has no vulnerability
T/F
False