Module 12 - Evading IDS , Firewalls, and Honeypots ( EC Mode Part 01 ) Flashcards
Deleted
Which of the following attributes in a packet can be used to check whether the packet originated from an unreliable zone?
A. TCP flag bits
B. Direction
C. Interface
D. Source IP address
Correct Answer: C. Interface
Which of the following types of firewall inspects only header information in network traffic?
A. Application-level gateway
B. Stateful inspection
C. Packet filter
D. Circuit-level gateway
Correct Answer: C. Packet filter
Which of the following intrusion detection technique involves first creating models of possible intrusions and then comparing these models with incoming events to make a detection decision?
A. Anomaly Detection
B. Signature Recognition
C. Protocol Anomaly Detection
D. Obfuscating
Correct Answer: B. Signature Recognition
Which of the following statements concerning proxy firewalls is correct?
A. Proxy firewalls block network packets from passing to and from a protected network
B. Firewall proxy servers decentralize all activity for an application
C. Computers establish a connection with a proxy firewall that initiates a new network connection for the client
D. Proxy firewalls increase the speed and functionality of a network
Correct Answer: C. Computers establish a connection with a proxy firewall that initiates a new network connection for the client
Which solution can be used to emulate computer services, such as mail and ftp, and to capture information related to logins or actions?
A. Honeypot
B. Intrusion detection system (IDS)
C. DeMilitarized zone (DMZ)
D. Firewall
Correct Answer: A. Honeypot
which of the following conditions does the IDS generate a true positive alert?
A. A true positive is a condition occurring when an IDS fails to react to an actual attack event
B. A true positive is a condition occurring when an IDS identifies an activity as acceptable behavior and the activity is acceptable
C. A true positive is a condition occurring when an event triggers an alarm and causes the IDS to react as if a real attack is in progress
D. A true positive is a condition occurring when an event triggers an alarm when no actual attack is in progress
Correct Answer: C. A true positive is a condition occurring when an event triggers an alarm and causes the IDS to react as if a real attack is in progress
What is the main advantage that a network-based IDS/IPS system has over a host-based solution?
A. They are easier to install and configure
B. They will not interfere with user interfaces
C. They are placed at the boundary, allowing them to inspect all traffic
D. They do not use host system resources
Correct Answer: D. They do not use host system resources
Which of the following indicators identifies a network intrusion?
A. Repeated probes of the available services on your machines
B. Sudden decrease in bandwidth consumption is an indication of intrusion
C. Connection requests from IPs from those systems within the network range
D. Rare login attempts from remote hosts
Correct Answer: A. Repeated probes of the available services on your machines
At which two traffic layers do most commercial IDSes generate signatures? (Select Two)
A. Application layer
B. Network layer
C. Session layer
D. Transport layer
Correct Answer: B. Network layer and D. Transport layer
Jamie has purchased and deployed an application firewall to protect his company infrastructure which includes various email servers, file server shares, and applications. Also, all the systems in his company share the same onsite physical datacenter. Jamie has positioned the newly purchased firewall nearest to the application systems so as to protect the applications from attackers. This positioning does not protect the complete network.
What can be done to address the security issues by this deployment for Jamie?
A. Jamie will need to add at least three additional firewalls at the DMZ, internet, and intranet
B. Jamie will need to add at least three additional firewalls at the untrusted network, router side, and application side
C. Jamie will need to replace the application firewall with a packet filtering firewall at the network edge
D. Jamie will need to add at least one additional firewall at the network edge
Correct Answer: D. Jamie will need to add at least one additional firewall at the network edge
Jamie was asked by their director to make new additions to the firewall in order to allow traffic for a new software package. After the firewall changes, Jamie receives calls from users that they cannot access other services, such as email and file shares, that they were able to access earlier.
What was the problem in the latest changes that is denying existing users from accessing network resources?
A. Jamie’s additional entries were processed first
B. Jamie needs to restart the firewall to make the changes effective
C. Jamie should exit privileged mode to allow the settings to be effective
D. Jamie needs to have the users restart their computers in order to make settings effective
Correct Answer: A. Jamie’s additional entries were processed first
When analyzing the IDS logs, the system administrator notices connections from outside of the LAN have been sending packets where the source IP address and destination IP address are the same. However, no alerts have been sent via email or logged in the IDS. Which type of an alert is this?
A. False negative
B. True negative
C. False positive
D. True positive
Correct Answer: A. False negative
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s computer to update the router configuration. What type of an alert is this?
A. True-negative
B. True-positive
C. False-negative
D. False-positive
Correct Answer: D. False-positive
A network administrator received an administrative alert at 3:00 a.m. from the intrusion detection system. The alert was generated because a large number of packets were coming into the network over ports 20 and 21. During analysis, there were no signs of attack on the FTP servers. How should the administrator understand this situation?
A. False negatives
B. True positives
C. True negatives
D. False positives
Correct Answer: D. False positives
Which of the following methods detects an intrusion based on the fixed behavioral characteristics of the users and components of a computer system?
A. Signature recognition
B. Bastion host
C. Anomaly detection
D. Protocol anomaly detection
Answer: C. Anomaly detection
The general indicators of which of the following types of intrusions are repeated login attempts from remote hosts, a sudden influx of log data, and a sudden increase in bandwidth consumption?
A. System intrusion
B. File-system intrusion
C. Signature recognition
D. Network intrusion
Answer: D. Network intrusion
Which of the following types of honeypots is very effective in determining the entire capabilities of adversaries and is mostly deployed in an isolated virtual environment along with a combination of vulnerable servers?
A. Honeynets
B. Spider honeypots
C. Spam honeypots
D. Malware honeypots
Correct Answer: A. Honeynets
Which of the following attributes in a packet can be used to check whether the packet originated from an unreliable zone?
A. Source IP address
B. Interface
C. Direction
D. TCP flag bits
Correct Answer: B. Interface
In which of the following conditions does the IDS generate a true positive alert?
A. A true positive is a condition occurring when an IDS identifies an activity as acceptable behavior and the activity is acceptable
B. A true positive is a condition occurring when an event triggers an alarm and causes the IDS to react as if a real attack is in progress
C. A true positive is a condition occurring when an event triggers an alarm when no actual attack is in progress
D. A true positive is a condition occurring when an IDS fails to react to an actual attack event
Correct Answer: B. A true positive is a condition occurring when an event triggers an alarm and causes the IDS to react as if a real attack is in progress
What is the main advantage that a network-based IDS/IPS system has over a host-based solution?
A. They are easier to install and configure
B. They do not use host system resources
C. They are placed at the boundary, allowing them to inspect all traffic
D. They will not interfere with user interfaces
Correct Answer: B. They do not use host system resources
Which of the following is a hardware requirement that either an IDS/IPS system or a proxy server must have in order to properly function?
A. Similar RAM requirements
B. They must be dual-homed
C. Fast processor to help with network traffic analysis
D. Fast network interface cards
Correct Answer: B. They must be dual-homed
Which type of intrusion detection system can monitor and alert on attacks, but cannot stop them?
A. Detective
B. Passive
C. Intuitive
D. Reactive
Correct Answer: B. Passive
An advantage of an application-level firewall is the ability to
A. Filter packets at the network level
B. Monitor TCP handshaking
C. Filter specific commands, such as http:post
D. Retain state information for each packet
Correct Answer: C. Filter specific commands, such as http:post