Network Forensics Flashcards
In network forensics, data collection can be performed using a “Stop, look, and listen” or a “Catch-it-as-you-can” strategy. Concerning the former, select which of the following statements are appropriate.
a. It performs a real-time processing
b. it requires fast processing
c. It requires much larger memory storage than a “Catch-it-as-you-can” strategy
d. Only certain packets are stored
e. All the listened packets are stored
a. It performs a real-time processing
b. it requires fast processing
d. Only certain packets are stored
Which of the following methods can be used to detect whether on a machine there is a sniffer running?
Select one or more:
a. Check for duplicates in the ARP table of a machine.
b. Sending a ping to the suspected machine with a wrong MAC address
c. Check the ping latency
d. Sending a broadcast ARP with a wrong MAC/IP pairing
a. Check for duplicates in the ARP table of a machine.
b. Sending a ping to the suspected machine with a wrong MAC address
c. Check the ping latency
Select among the following, some sniffing tools or software Select one or more: a. Neped b. Wireshark c. Ethereal d. Snort e. Ettercap f. ARP watch
b. Wireshark
d. Snort,
c. Ethereal,
e. Ettercap
Among the following, select the antisniffing softwares or strategies
Select one or more:
a. Wireshark
b. Flooding the network
c. Cyphering the data (PGP, SSH)
d. Snort
e. Add some MAC address permanently in tables
c. Cyphering the data (PGP, SSH)
d. Snort
e. Add some MAC address permanently in tables
Select which of the following softwares and tools can be used to carry on a Man-In-The-Middle attack on a router
Select one or more:
a. Encryption
b. Router Audit Tool (RAT)
c. Ultima Ratio
d. VIPPR
c. VIPPR,
d. Ultima Ratio
Which of the following incidents a DEFR could analyze on a router
Select one or more:
a. The router is infected by a malware performing SYN flood attacks
b. The working state of the router is compromised (DoS)
c. Theft of Information
d. The router is working in promiscuos mode
e. The routing table has been manipulated
b. The working state of the router is compromised (DoS)
c. Theft of Information
e. The routing table has been manipulated
Network-based Intrusion Detection Systems (NIDS) … (select the most appropriate sentences)
Select one or more:
a. … tell if the attack is successful.
b. … raises an alarm during some suspicious network activity.
c. … evaluate network traffic.
d. … monitor a specific protocol.
c. … evaluate network traffic.,
b. … raises an alarm during some suspicious network activity.
Among the following, select the most correct statements concerning Host-based IDS.
Select one or more:
a. HIDS are robust to fragmentation and TTL attack.
b. HIDS can monitor log files, system activities, errors
c. HIDS can detect out-of-band attacks (e.g., juice jacking)
d. HIDS provide a network-wide overview of the attack
e. Maintenance for different HIDS is extremely easy.
a. HIDS are robust to fragmentation and TTL attack.
b. HIDS can monitor log files, system activities, errors
c. HIDS can detect out-of-band attacks (e.g., juice jacking)
Concerning Network-based Intrusion Detection Systems (NIDS), we can state that …
Select one or more:
a. … they work in promiscuous mode.
b. … they do not waste network or CPU resources
c. … they are robust to packet fragmentation and re-assembly
d. … they can experience some problems if the network usage increases.
e. … they are not affected by TTL attacks
a. … they work in promiscuous mode.
b. … they do not waste network or CPU resources
d. … they can experience some problems if the network usage increases.
In signature-based IDS trigger, …
Select one or more:
a. … profiles are dynamic.
b. …it is possible to detect a previously-known attack only.
c. … protection is instantaneous after signature update.
d. … attackers can not pre-configure an IDS-transparent attack.
b. …it is possible to detect a previously-known attack only.
c. … protection is instantaneous after signature update.
In wireless forensics operations, …
Select one or more:
a. … it is necessary to sense multiple frequencies since devices can connect to multiple APS.
b. … storage and processing requirements can be very low for passive devices.
c. … capture time depends on the motion states of the monitored devices
a. … it is necessary to sense multiple frequencies since devices can connect to multiple APS.
c. … capture time depends on the motion states of the monitored devices
The use of honeypot terminals in a network presents some issues. Select the correct ones.
Select one or more:
a. Honeypots compromise the safety of the network.
b. If no damage is done by the attack, no legal claim is possible.
c. Since they are designed to be compromised, we can weaken the monitoring on them.
d. Honeypot are illegal in many countries.
b. If no damage is done by the attack, no legal claim is possible.
Traceback softwares ans strategies can resort to different analysis methods. Select the correct ones.
Select one or more:
a. probabilistic packet marking
b. keeping a distributed marking tables for packets
c. monitoring IP and ports of attacking terminals.
d. packet logging
a. probabilistic packet marking
b. keeping a distributed marking tables for packets
d. packet logging
Among the following, select the wrong statement concerning Network-based IDS.
Select one:
a. They require storage and fast processing capabilities
b. They can detect out-of-band attacks
c. They provide a network-wide overview of the attack
d. They are not robust to fragmentation and TTL attack
b. They can detect out-of-band attacks
In signature-based IDS trigger, ___ (select the correct completion)
Select one:
a. ___ initially, false-positive and negative percentages are very high
b. ___ it is possible to detect a new anomaly
c. ___ protection is instantaneous after database update
d. ___ profiles are dynamically updating
c. ___ protection is instantaneous after database update