Module 4 / Unit 3 / Network Security Design Flashcards

1
Q

Apart from software crashes, what is a possible effect of a software exploit?

A

Allows the attacker to execute code on the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of activity is often a prelude to a full-scale network attack?

A

Footprinting - obtaining information about the network and security system. This might be done by port scanning, eavesdropping, or social engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the usual goal of an ARP spoofing attack?

A

To redirect traffic to the attacker’s machine by masquerading as the subnet’s default gateway. This allows the attacker to eavesdrop on traffic or perform a Man-in-the-Middle attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What means might an attacker use to redirect traffic to a fake site by abusing DNS name resolution?

A

By injecting false mappings into the client cache or into the server cache or by getting the client to use a rogue DNS resolver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of a DMZ?

A

To provide services such as web and email that require Internet connectivity without allowing access to the private network from the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can a DMZ be implemented?

A

Either using two firewalls (external and internal) as a screened subnet or using a triple-homed firewall (one with three network interfaces).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What methods can be used to allocate a particular host to a VLAN?

A

The simplest is by connection port but this can also be configured by MAC address, IP address, or user authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When connecting an ordinary client workstation to a switch and assigning it to a VLAN, should the switch port be tagged or untagged?

A

Untagged - this means the switch handles VLAN assignment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a trunk port?

A

A port used to connect switches. This allows hosts connected to different switches to communicate and to configure VLANs across multiple switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What distinguishes port address translation from static NAT?

A

Static NAT establishes a 1:1 mapping between a public and private address. PAT uses port numbers to share one or more public addresses between many privately addressed hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Other than completely disabling the protocol, how could you mitigate the risk posed by an open port?

A

Using a firewall to block the port on segments of the network where the protocol should not be in use or restricting use of the port to authorized hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of security audit performs active testing of security controls?

A

A penetration test (pen test). A vulnerability assessment is one that use passive testing techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly