Module 12 - Evading IDS , Firewalls, and Honeypots ( EC Mode Part 01 ) Flashcards
Deleted
Which of the following attributes in a packet can be used to check whether the packet originated from an unreliable zone?
A. TCP flag bits
B. Direction
C. Interface
D. Source IP address
Correct Answer: C. Interface
Which of the following types of firewall inspects only header information in network traffic?
A. Application-level gateway
B. Stateful inspection
C. Packet filter
D. Circuit-level gateway
Correct Answer: C. Packet filter
Which of the following intrusion detection technique involves first creating models of possible intrusions and then comparing these models with incoming events to make a detection decision?
A. Anomaly Detection
B. Signature Recognition
C. Protocol Anomaly Detection
D. Obfuscating
Correct Answer: B. Signature Recognition
Which of the following statements concerning proxy firewalls is correct?
A. Proxy firewalls block network packets from passing to and from a protected network
B. Firewall proxy servers decentralize all activity for an application
C. Computers establish a connection with a proxy firewall that initiates a new network connection for the client
D. Proxy firewalls increase the speed and functionality of a network
Correct Answer: C. Computers establish a connection with a proxy firewall that initiates a new network connection for the client
Which solution can be used to emulate computer services, such as mail and ftp, and to capture information related to logins or actions?
A. Honeypot
B. Intrusion detection system (IDS)
C. DeMilitarized zone (DMZ)
D. Firewall
Correct Answer: A. Honeypot
which of the following conditions does the IDS generate a true positive alert?
A. A true positive is a condition occurring when an IDS fails to react to an actual attack event
B. A true positive is a condition occurring when an IDS identifies an activity as acceptable behavior and the activity is acceptable
C. A true positive is a condition occurring when an event triggers an alarm and causes the IDS to react as if a real attack is in progress
D. A true positive is a condition occurring when an event triggers an alarm when no actual attack is in progress
Correct Answer: C. A true positive is a condition occurring when an event triggers an alarm and causes the IDS to react as if a real attack is in progress
What is the main advantage that a network-based IDS/IPS system has over a host-based solution?
A. They are easier to install and configure
B. They will not interfere with user interfaces
C. They are placed at the boundary, allowing them to inspect all traffic
D. They do not use host system resources
Correct Answer: D. They do not use host system resources
Which of the following indicators identifies a network intrusion?
A. Repeated probes of the available services on your machines
B. Sudden decrease in bandwidth consumption is an indication of intrusion
C. Connection requests from IPs from those systems within the network range
D. Rare login attempts from remote hosts
Correct Answer: A. Repeated probes of the available services on your machines
At which two traffic layers do most commercial IDSes generate signatures? (Select Two)
A. Application layer
B. Network layer
C. Session layer
D. Transport layer
Correct Answer: B. Network layer and D. Transport layer
Jamie has purchased and deployed an application firewall to protect his company infrastructure which includes various email servers, file server shares, and applications. Also, all the systems in his company share the same onsite physical datacenter. Jamie has positioned the newly purchased firewall nearest to the application systems so as to protect the applications from attackers. This positioning does not protect the complete network.
What can be done to address the security issues by this deployment for Jamie?
A. Jamie will need to add at least three additional firewalls at the DMZ, internet, and intranet
B. Jamie will need to add at least three additional firewalls at the untrusted network, router side, and application side
C. Jamie will need to replace the application firewall with a packet filtering firewall at the network edge
D. Jamie will need to add at least one additional firewall at the network edge
Correct Answer: D. Jamie will need to add at least one additional firewall at the network edge
Jamie was asked by their director to make new additions to the firewall in order to allow traffic for a new software package. After the firewall changes, Jamie receives calls from users that they cannot access other services, such as email and file shares, that they were able to access earlier.
What was the problem in the latest changes that is denying existing users from accessing network resources?
A. Jamie’s additional entries were processed first
B. Jamie needs to restart the firewall to make the changes effective
C. Jamie should exit privileged mode to allow the settings to be effective
D. Jamie needs to have the users restart their computers in order to make settings effective
Correct Answer: A. Jamie’s additional entries were processed first
When analyzing the IDS logs, the system administrator notices connections from outside of the LAN have been sending packets where the source IP address and destination IP address are the same. However, no alerts have been sent via email or logged in the IDS. Which type of an alert is this?
A. False negative
B. True negative
C. False positive
D. True positive
Correct Answer: A. False negative
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s computer to update the router configuration. What type of an alert is this?
A. True-negative
B. True-positive
C. False-negative
D. False-positive
Correct Answer: D. False-positive
A network administrator received an administrative alert at 3:00 a.m. from the intrusion detection system. The alert was generated because a large number of packets were coming into the network over ports 20 and 21. During analysis, there were no signs of attack on the FTP servers. How should the administrator understand this situation?
A. False negatives
B. True positives
C. True negatives
D. False positives
Correct Answer: D. False positives
Which of the following methods detects an intrusion based on the fixed behavioral characteristics of the users and components of a computer system?
A. Signature recognition
B. Bastion host
C. Anomaly detection
D. Protocol anomaly detection
Answer: C. Anomaly detection
The general indicators of which of the following types of intrusions are repeated login attempts from remote hosts, a sudden influx of log data, and a sudden increase in bandwidth consumption?
A. System intrusion
B. File-system intrusion
C. Signature recognition
D. Network intrusion
Answer: D. Network intrusion
Which of the following types of honeypots is very effective in determining the entire capabilities of adversaries and is mostly deployed in an isolated virtual environment along with a combination of vulnerable servers?
A. Honeynets
B. Spider honeypots
C. Spam honeypots
D. Malware honeypots
Correct Answer: A. Honeynets
Which of the following attributes in a packet can be used to check whether the packet originated from an unreliable zone?
A. Source IP address
B. Interface
C. Direction
D. TCP flag bits
Correct Answer: B. Interface
In which of the following conditions does the IDS generate a true positive alert?
A. A true positive is a condition occurring when an IDS identifies an activity as acceptable behavior and the activity is acceptable
B. A true positive is a condition occurring when an event triggers an alarm and causes the IDS to react as if a real attack is in progress
C. A true positive is a condition occurring when an event triggers an alarm when no actual attack is in progress
D. A true positive is a condition occurring when an IDS fails to react to an actual attack event
Correct Answer: B. A true positive is a condition occurring when an event triggers an alarm and causes the IDS to react as if a real attack is in progress
What is the main advantage that a network-based IDS/IPS system has over a host-based solution?
A. They are easier to install and configure
B. They do not use host system resources
C. They are placed at the boundary, allowing them to inspect all traffic
D. They will not interfere with user interfaces
Correct Answer: B. They do not use host system resources
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
A. Similar RAM requirements
B. They must be dual-homed
C. Fast processor to help with network traffic analysis
D. Fast network interface cards
Correct Answer: B. They must be dual-homed
Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?
A. Detective
B. Passive
C. Intuitive
D. Reactive
Correct Answer: B. Passive
An advantage of an application-level firewall is the ability to
A. Filter packets at the network level
B. Monitor TCP handshaking
C. Filter specific commands, such as http:post
D. Retain state information for each packet
Correct Answer: C. Filter specific commands, such as http:post
Teyla is a security analyst for BAYARA Company. She is responsible for the firewall, antivirus, IPS, and web filtering security controls. She wants to protect the employees from a new phishing attack. What should Teyla do?
A. Use the web filtering application to prevent the employees from accessing the phishing webpage
B. Use IPS to block phishing
C. Block the phishing via antivirus
D. Block outbound traffic to the ports 80 and 443 in the firewall
Correct Answer: A. Use the web filtering application to prevent the employees from accessing the phishing webpage
When analyzing the IDS logs, the system administrator notices connections from outside of the LAN have been sending packets where the source IP address and destination IP address are the same. However, no alerts have been sent via email or logged in the IDS. Which type of an alert is this?
A. True negative
B. False positive
C. False negative
D. True positive
Correct Answer: C. False negative
Which of the following is a mobile intrusion detection tool that allows users to find all the devices connected to a network and provides relevant data such as the IP addresses, manufacturer names, device names, and MAC addresses of the connected devices?
A. Wifiphisher
B. Wifi Inspector
C. WIBR+
D. Reaver
Correct Answer: B. Wifi Inspector
Which of the following commands is an example of a Snort rule using a bidirectional operator?
A. log tcp any any -> 192.168.1.0/24 !6000:6010
B. alert tcp !192.168.1.0/24 any -> 192.168.1.0/24 111
C. 192.168.1.0/24 1:1024
D. log !192.168.1.0/24 any <> 192.168.1.0/24 23
Correct Answer: D. log !192.168.1.0/24 any <> 192.168.1.0/24 23
Which of the following is a security solution for mobile devices that can reduce a mobile device’s network traffic and battery consumption as well as allow users to create network rules based on apps, IP addresses, and domain names?
A. Bitvise
B. NetPatch Firewall
C. KFSensor
D. Snort
Correct Answer: B. NetPatch Firewall
When an alert rule is matched in a network-based IDS like snort, the IDS does which of the following:
A. Blocks the connection with the source IP address in the packet
B. Continues to evaluate the packet until all rules are checked
C. Stops checking rules, sends an alert, and lets the packet continue
D. Drops the packet and moves on to the next one
Correct Answer: B. Continues to evaluate the packet until all rules are checked
Which of the following is not an action present in Snort IDS?
A. Alert
B. Pass
C. Audit
D. Log
Correct Answer: C. Audit
Which of the following firewalls is used to secure mobile device?
A. NetPatch firewall
B. Glasswire
C. TinyWall
D. Comodo firewall
Correct Answer: A. NetPatch firewall
Manav wants to simulate a complete system and provide an appealing target to push hackers away from the production systems of his organization. Can you identify the tool?
A. PeerBlock
B. TinyWall
C. SPECTER
D. Glasswire
Correct Answer: C. SPECTER
Which of the following firewall solution tool has the following features:
Two-way firewall that monitors and blocks inbound as well as outbound traffic
Allows users to browse the web privately
Identity protection services help to prevent identity theft by guarding crucial data of the users. It also offers PC protection and data encryption
Through Do Not Track, it stops data-collecting companies from tracking the online users
Online Backup to backs up files and restores the data in the event of loss, theft, accidental deletion or disk failure
A. Vangaurd Enforcer
B. zIPS
C. Wifi Inspector
D. ZoneAlarm Free Firewall
Correct Answer: D. ZoneAlarm Free Firewall
Which of the following is a malware research tool that allows security analysts to detect and classify malware or other malicious codes through a rule-based approach?
A. Hping3
B. Nmap
C. YARA
D. Fing
Correct Answer: C. YARA
Which of the following tools helps security professionals in generating YARA rules from strings identified in malware files?
A. yarGen
B. Weevely
C. Tamper Chrome
D. HoneyBOT
Correct Answer: A. yarGen
Which of the following is an IDS evasion technique used by an attacker to confuse the IDS by forcing it to read invalid packets as well as blindly trust and accept a packet that an end system rejects?
A. Insertion attack
B. Fragmentation attack
C. Obfuscation
D. Invalid RST packets
Correct Answer: A. Insertion attack
One of the following is an IDS evasion technique used by an attacker to send a huge amount of unnecessary traffic to produce noise or fake traffic. If the IDS does not analyze the noise traffic, the true attack traffic goes undetected.
A. Flooding
B. Encryption
C. Overlapping fragments
D. Denial-of-service attack
Correct Answer: A. Flooding
In which of the following IDS evasion techniques does an attacker use an existing buffer-overflow exploit and set the “return” memory address on the overflowed stack to the entrance point of the decryption code?
A. Urgency flag
B. Polymorphic shellcode
C. Invalid RST packets
D. Overlapping fragments
Correct Answer: B. Polymorphic shellcode