Day 4 1-38 Flashcards
4.1 When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?
A. Network tap
B. Layer 3 switch
C. Network bridge
D. Application firewall
A. Network tap
4.2 SSL has been seen as the solution to a lot of common security problems. Administrator will often make use of SSL to encrypt communications from point A to point B. Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?
A. SSL is redundant if you already have IDS’s in place
B. SSL will trigger rules at regular interval and force the administrator to turn them off
C. SSL will slow down the IDS while it is breaking the encryption to see the packet content
D. SSL will hide the content of the packets and Intrusion Detection Systems will not be able to detect them
D. SSL will hide the content of the packets and Intrusion Detection Systems will not be able to detect them
4.3 Which TWO types of detection methods are employed by Network Intrusion Detection Systems (NIDS)?
A. Signature
B. Anomaly
C. Passive
D. Reactive
A. Signature
B. Anomaly
4.4 Which of the following problems can be solved by using Wireshark?
A. Tracking version changes of source code
B. Checking creation dates on all webpages on a server
C. Resetting the administrator password on multiple systems
D. Troubleshooting communication resets between two systems
D. Troubleshooting communication resets between two systems
4.5 Your IDS generated an alert because there was a lot of traffic hitting your SQL server. You investigate the server, but there is no indication of an attack and everything looks fine. How then should you classify the IDS alert?
A. True negatives
B. False negatives
C. True positives
D. False positives
D. False positives
4.6 You logged in to your corporate firewall to do some work, but the IDS logged your activity as an attack. How would you categorize the alert?
A. False positive
B. False negative
C. True positive
D. True negative
A. False positive
4.7 What hardware requirement should your IDS, IPS, or proxy server have as a best-practice?
A. Fast processor to help with network traffic analysis
B. They should be dual-homed
C. Similar RAM requirements
D. Fast network interface cards
B. They should be dual-homed
4.8 A hacker has been attacking your network. You find that your IDS wasn’t configured correctly and couldn’t notify you about the attacks. Which type of alert is the IDS giving?
A. True positives
B. True negatives
C. False positives
D. False negatives
D. False negatives
4.9 A penetration tester is attempting to scan an internal corporate network from the internet without alerting the border sensor. Which is the most efficient technique that the tester should consider using?
A. Spoofing an IP address
B. Tunneling scan over SSH
C. Tunneling over high port numbers
D. Scanning using fragmented IP packets
B. Tunneling scan over SSH
4.10 This IDS defeating technique works by splitting a datagram (or packet) into a continuous stream of multiple (small) fragments and the IDS will not spot the true nature of the fully assembled datagram. The datagram is not reassembled until it reaches its final destination. It would be a processor-intensive task for IDS to reassemble all fragments itself, and on a busy system the packet will slip through the IDS onto the network.
What is this technique called?
A. IP Routing or Packet Dropping
B. IDS Spoofing or Session Assembly
C. IP Fragmentation or Session Splicing
D. IP Splicing or Packet Reassembly
C. IP Fragmentation or Session Splicing
4.11 In keeping with the best practices of layered security, where are the best places to place intrusion detection/intrusion prevention systems? (Choose two.)
A. HID/HIP (Host-based Intrusion Detection/Host-based Intrusion Prevention)
B. NID/NIP (Node-based Intrusion Detection/Node-based Intrusion Prevention)
C. NID/NIP (Network-based Intrusion Detection/Network-based Intrusion Prevention)
D. CID/CIP (Computer-based Intrusion Detection/Computer-based Intrusion Prevention)
A. HID/HIP (Host-based Intrusion Detection/Host-based Intrusion Prevention)
C. NID/NIP (Network-based Intrusion Detection/Network-based Intrusion Prevention)
4.12 Which FOUR of these techniques could you use to evade an IDS, or at least protect yourself, during a port scan?
A. Use fragmented IP packets
B. Spoof your IP address when launching attacks and sniff responses from the server
C. Overload the IDS with Junk traffic to mask your scan
D. Use source routing (if possible)
E. Connect to proxy servers or compromised Trojan’d machines to launch attacks
A. Use fragmented IP packets
B. Spoof your IP address when launching attacks and sniff responses from the server
D. Use source routing (if possible)
E. Connect to proxy servers or compromised Trojan’d machines to launch attacks
4.13 Which of these will recognize attempts to penetrate the network?
A. Router
B. Firewall
C. Proxy
D. Intrusion Detection System
D. Intrusion Detection System
4.14 Which of these would be the best way to evade the NIDS?
A. Encryption
B. Out of band signaling
C. Protocol Isolation
D. Alternate Data Streams
A. Encryption
4.15 How can telnet be used to fingerprint a web server?
A. telnet webserverAddress 80 HEAD / HTTP/1.0 B. telnet webserverAddress 80 PUT / HTTP/1.0 C. telnet webserverAddress 80 HEAD / HTTP/2.0 D. telnet webserverAddress 80 PUT / HTTP/2.0
A. telnet webserverAddress 80
HEAD / HTTP/1.0
4.16 On a Linux device, which of the following commands will start the Nessus client in the background so that the Nessus server can be configured?
A. nessus +
B. nessus *s
C. nessus &
D. nessus -d
C. nessus &
4.17 What is it called when an IDS can discover attacks but not stop them?
A. Detective
B. Passive
C. Intuitive
D. Reactive
B. Passive
4.18 A Security Engineer has been tasked with discovering how much information can be obtained from the firm’s public facing web servers. The engineer decides to start by using netcat to port 80. The engineer receives this output:
HTTP/1.1 200 OK Server: Microsoft-IIS/6 Expires: Tue, 17 Jan 2011 01:41:33 GMT DatE. Mon, 16 Jan 2011 01:41:33 GMT Content-TypE. text/html Accept-Ranges: bytes Last-ModifieD. Wed, 28 Dec 2010 15:32:21 GMT
Which of the following is an example of what the engineer performed?
A. Cross-site scripting
B. Banner grabbing
C. SQL injection
D. Whois database query
B. Banner grabbing
4.19 What’s the best approach to tuning security alerts?
A. Raise false positives and raise false negatives.
B. Decrease false negatives.
C. Tune to avoid false positives and false negatives.
D. Decrease false positives
C. Tune to avoid false positives and false negatives.
4.20 Which type of scanning technique splits the TCP header into many packets so that it becomes hard for network monitoring devices to figure out what the packets are meant for?
A. Ack flag scanning
B. IP fragment scanning
C. TCP scanning
D. Inverse TCP flag scanning
B. IP fragment scanning
4.21 What’s it called when someone sends a large amount of traffic, in order generate a large amount of alerts on the IDS, in an attempt to hide the real traffic?
A. Insertion attack
B. Denial-of-Service
C. Obfuscating
D. False Positive Generation
D. False Positive Generation
An Obfuscation Technique will encode the payload in such a way that the IDS can’t understand it, but the target can understand. A False Positive Generation Attack attempts to hide the attack traffic in a large volume of false positive alerts.
4.22 Which technical characteristic do Ethereal/Wireshark, TCPDump, and Snort have in common?
A. They are written in Java.
B. They send alerts to security monitors.
C. They use the same packet analysis engine.
D. They use the same packet capture utility.
D. They use the same packet capture utility.
4.23 Which of the following does proper basic configuration of snort as a network intrusion detection system require?
A. Limit the packets captured to the /var/log/snort directory
B. Capture every packet on the network segment
C. Limit the packets captured to a single segment
D. Limit the packets captured to the snort configuration file
D. Limit the packets captured to the snort configuration file
4.24 When discussing trojans, what is a wrapper?
A. An encryption tool to protect the Trojan
B. A tool used to bind the Trojan with a legitimate file
C. A tool used to calculate bandwidth and CPU cycles wasted by the Trojan
D. A tool used to encapsulate packets within a new header and footer
B. A tool used to bind the Trojan with a legitimate file