Day 4 1-38 Flashcards
4.1 When using Wireshark to acquire packet capture on a network, which device would enable the capture of all traffic on the wire?
A. Network tap
B. Layer 3 switch
C. Network bridge
D. Application firewall
A. Network tap
4.2 SSL has been seen as the solution to a lot of common security problems. Administrator will often make use of SSL to encrypt communications from point A to point B. Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?
A. SSL is redundant if you already have IDS’s in place
B. SSL will trigger rules at regular interval and force the administrator to turn them off
C. SSL will slow down the IDS while it is breaking the encryption to see the packet content
D. SSL will hide the content of the packets and Intrusion Detection Systems will not be able to detect them
D. SSL will hide the content of the packets and Intrusion Detection Systems will not be able to detect them
4.3 Which TWO types of detection methods are employed by Network Intrusion Detection Systems (NIDS)?
A. Signature
B. Anomaly
C. Passive
D. Reactive
A. Signature
B. Anomaly
4.4 Which of the following problems can be solved by using Wireshark?
A. Tracking version changes of source code
B. Checking creation dates on all webpages on a server
C. Resetting the administrator password on multiple systems
D. Troubleshooting communication resets between two systems
D. Troubleshooting communication resets between two systems
4.5 Your IDS generated an alert because there was a lot of traffic hitting your SQL server. You investigate the server, but there is no indication of an attack and everything looks fine. How then should you classify the IDS alert?
A. True negatives
B. False negatives
C. True positives
D. False positives
D. False positives
4.6 You logged in to your corporate firewall to do some work, but the IDS logged your activity as an attack. How would you categorize the alert?
A. False positive
B. False negative
C. True positive
D. True negative
A. False positive
4.7 What hardware requirement should your IDS, IPS, or proxy server have as a best-practice?
A. Fast processor to help with network traffic analysis
B. They should be dual-homed
C. Similar RAM requirements
D. Fast network interface cards
B. They should be dual-homed
4.8 A hacker has been attacking your network. You find that your IDS wasn’t configured correctly and couldn’t notify you about the attacks. Which type of alert is the IDS giving?
A. True positives
B. True negatives
C. False positives
D. False negatives
D. False negatives
4.9 A penetration tester is attempting to scan an internal corporate network from the internet without alerting the border sensor. Which is the most efficient technique that the tester should consider using?
A. Spoofing an IP address
B. Tunneling scan over SSH
C. Tunneling over high port numbers
D. Scanning using fragmented IP packets
B. Tunneling scan over SSH
4.10 This IDS defeating technique works by splitting a datagram (or packet) into a continuous stream of multiple (small) fragments and the IDS will not spot the true nature of the fully assembled datagram. The datagram is not reassembled until it reaches its final destination. It would be a processor-intensive task for IDS to reassemble all fragments itself, and on a busy system the packet will slip through the IDS onto the network.
What is this technique called?
A. IP Routing or Packet Dropping
B. IDS Spoofing or Session Assembly
C. IP Fragmentation or Session Splicing
D. IP Splicing or Packet Reassembly
C. IP Fragmentation or Session Splicing
4.11 In keeping with the best practices of layered security, where are the best places to place intrusion detection/intrusion prevention systems? (Choose two.)
A. HID/HIP (Host-based Intrusion Detection/Host-based Intrusion Prevention)
B. NID/NIP (Node-based Intrusion Detection/Node-based Intrusion Prevention)
C. NID/NIP (Network-based Intrusion Detection/Network-based Intrusion Prevention)
D. CID/CIP (Computer-based Intrusion Detection/Computer-based Intrusion Prevention)
A. HID/HIP (Host-based Intrusion Detection/Host-based Intrusion Prevention)
C. NID/NIP (Network-based Intrusion Detection/Network-based Intrusion Prevention)
4.12 Which FOUR of these techniques could you use to evade an IDS, or at least protect yourself, during a port scan?
A. Use fragmented IP packets
B. Spoof your IP address when launching attacks and sniff responses from the server
C. Overload the IDS with Junk traffic to mask your scan
D. Use source routing (if possible)
E. Connect to proxy servers or compromised Trojan’d machines to launch attacks
A. Use fragmented IP packets
B. Spoof your IP address when launching attacks and sniff responses from the server
D. Use source routing (if possible)
E. Connect to proxy servers or compromised Trojan’d machines to launch attacks
4.13 Which of these will recognize attempts to penetrate the network?
A. Router
B. Firewall
C. Proxy
D. Intrusion Detection System
D. Intrusion Detection System
4.14 Which of these would be the best way to evade the NIDS?
A. Encryption
B. Out of band signaling
C. Protocol Isolation
D. Alternate Data Streams
A. Encryption
4.15 How can telnet be used to fingerprint a web server?
A. telnet webserverAddress 80 HEAD / HTTP/1.0 B. telnet webserverAddress 80 PUT / HTTP/1.0 C. telnet webserverAddress 80 HEAD / HTTP/2.0 D. telnet webserverAddress 80 PUT / HTTP/2.0
A. telnet webserverAddress 80
HEAD / HTTP/1.0