Deck 7 Flashcards

1
Q

An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker’s IP address instead of the IP address of the default gateway. Based on the given info, which type of attack is taking place in this scenario?

A

ARP Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The term “DHCP snooping” refers to an exploit that enables operation of a rogue DHCP network server.

A

False.

DHCP Snooping is a security feature that can be enabled on a network switch to prevent rogue DHCP servers from being introduced on the network. DHCP snooping works by intercepting and validating DHCP messages exchanged between DHCP clients and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as?

A

MAC Spoofing

MAC Cloning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following attacks relies on altering the source layer 3 address?

A

IP Spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Of the three existing versions of the Simple Network Management Protocol (SNMP), versions 1 and 2 (SNMPv1 and SNMPv2) offer authentication based on community strings sent in an unencrypted form (in cleartext). SNMPv3 provides packet encryption, authentication, and hashing mechanisms that allow for checking whether data has changed in transit (i.e. validation of data integrity).

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In IPv6, a router periodically sends a special type of message to announce its presence on the network. A mechanism that allows to filter these messages (i.e. reject those that are labeled as unwanted or rogue) is known as?

A

RA Guard.

RA Guard is Router Advertisement Guard and is a security feature that can be enabled on a network switch to prevent rogue router advertisements. It works by intercepting and validating RAs exchanged between gateways and hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refers to a dedicated security mechanism that prevents ARP attacks?

A

DAI (not NGFW).

DAI is Dynamic ARP Inspection and protects ARP from poisoning. DAI checks all ARP packets on untrusted interfaces and compares the information in the ARP packet with the DHCP snooping database and/or an ARP access list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rogue DHCP Servers?

A

A rogue DHCP server is a server on a network not under administrative control. It is a network device such as a modem or router and can intercept network traffic and manipulate settings. It can potentially route traffic from a target system through this device, for monitoring or manipulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Private VLANs are created via?

A

Port Isolation.

Private VLANs are used to achieve fine-grained isolation and security. They enhance access control and improve network reliability and security. They segregate traffic on one physical link into its broadcast domain, meaning all hosts connected to the same physical link can see each other, but not talk directly with any host outside the VLAN. It also provides protection against attacks such as ARP Poisoning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Changing the native VLAN on all trunk ports to an unused VLAN ID is one of the countermeasures against VLAN hopping?

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?

A

ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A rule-based access control mechanism implemented on routers, switches, and firewalls is referred to as?

A

ACL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which VPN type is used for connecting computers to a network?

A

Remote access.

Client-to-site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An HTML5 VPN portal is an example of clientless VPN implementation where an HTML5-compliant web browser along with TLS encryption can be used instead of a dedicated VPN client software.

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the terms listed below is used to describe a type of VPN that alleviates bottlenecks and conserves bandwidth by enabling utilization of both the VPN and public network links?

A

Split Tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers refers to a non-proprietary remote-access protocol that enables control over another computer on the network with the use of a graphical user interface?

A

VNC

VNC is Virtual Network Computing, a graphical sharing system allowing remote control of another computer.

17
Q

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

A

RFID.

18
Q

A type of identification badge that can be held within a certain distance of the reader to authenticate the holder is called?

A

RFID.

19
Q

Which of the following examples do not fall into the category of physical security detective controls?

.

A

Access control vestibules.

Access control hardware.

Employee training

20
Q

Which of the following examples do not fall into the category of physical security preventive controls?

A

Asset Tages.

Motion sensors.

Tamper Protection Mechanisms.

21
Q

In the troubleshooting methodology, the process of establishing a theory of probable problem cause does not involve:

A

Asking for assistance.

22
Q

Which step of the troubleshooting process involves reestablishing a new theory or escalating the problem?

A

Testing the theory to determine the cause.

23
Q

The troubleshooting process/methodology?

A
  1. Identifying the problem (gather information, questions users, examine recent changes).
  2. Establishing a theory of probable cause.
  3. Testing the theory to determine the problem cause (reestablishing a new theory or escalating).
  4. Establishing a plan of action to resolve the problem (identify potential effects of the solution).
  5. Implementing a solution (asking for assistance).
  6. Verify system functionality and implementation of preventative measures.
  7. Document finding, actions, outcomes and conclusions.