Network Security Flashcards

1
Q

A person, device, location, or information that SecOps aims to protect from attack

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An action taken by a threat that exploits a vulnerability that attempts to either block authorized access to an asset, or to gain unauthorized access to an asset.

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The potential of a threat to exploit a vulnerability via an attack.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The abbreviation for IT security operations; a discipline within IT responsible for protecting assets by reducing the risk of attacks.

A

SecOps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Something or someone that can exploit a vulnerability to attack an asset.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A weakness in software, hardware, facilities, or humans that can be exploited by a threat.

A

Vulnerability:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is an indispensable tool for detecting vulnerabilities within servers, computers, and network devices. can be cloud-based or may be installed as a software application on your laptop or a dedicated security server

A

vulnerability scanner
It is important to regularly run these scanners within your network for early identification and mitigation of new vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The best electronic security in the world will not help you if your physical security is weak. Even the best encryption on the market today can be eventually overcome through sheer brute force methods of trying key after key until one finally unlocks your secrets.

A

Poor Physical Security Measures.
you need to protect your assets with both physical and electronic security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

*Poor Physical Security Measures
*Weak Passwords or Using Default Passwords
*Misconfigured Firewall Rules
*Personal Devices Within the Network
*Advanced Persistent Threats
*Zero-Day: Protecting Against the Unknown

A

some common vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the virus or malware remains undetected while it sits idle for long periods, perhaps months, just waiting for the right time

A

advanced persistent threat (APT)
it is lying in wait for some preordained time or a trigger from an outside source, at which point it will unleash its attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It sits idle long enough to ensure that it has been added to as many backups as possible so that even if you restore from backup, you have no choice but to comply with the attacker.

A

advanced persistent threat (APT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is not yet known by the public, meaning there is no patch available to mitigate this vulnerability.

A

zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

*Vulnerability Testers
*Blue, Red, White, and Purple Teams
*Hackers: White Hat, Black Hat, and Gray Hat
*Insider Threats
*Nation States
*Script Kiddies

A

Attacker Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

responsible for scanning servers and network devices for known vulnerabilities

A

vulnerability tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

team attempts to compromise the security

A

red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

team defends

A

blue team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

neutral team that observes the festivities and may even serve as referee.

A

white team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

the red and blue team engage, and then when certain success criteria are met, the teams debrief, cross-train each other, and repeat

A

purple team
also known as an iterate and improve model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

hackers are IT professionals who specialize in penetrating or compromising network security but only to help an organization improve its own security posture. only perform the attacks when authorized to do so; to the fullest extent possible, they remain in compliance with any and all laws governing such behavior.

A

white hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

may or may not be IT professionals but possess the knowledge and will to breach systems for profit

A

black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a group of people who may or may not be IT professionals and may or may not choose to break laws in pursuit of their hacking goals. have no malicious intent in their actions; they may not have obtained permission to perform the attack.

A

gray hat hackers

23
Q

access to systems, they are in a position to hack from the inside of the network, often undetected. not all threats are malicious in nature. Accidents happen, and if your account was granted extraordinary privileges, you could accidentally impact a large number of users with a single incorrect command

A

insider threats
key to success is restricting access to the minimum set of permissions needed to perform the job and enable audit logging of all administrative actions so that you can later determine the cause of mysterious changes.

24
Q

intellectual property theft through industrial espionage is a very real concern for many companies. The bigger threat is that substantially larger budgets to hire hackers than the average criminal enterprise

A

nation states

25
Q

copycat criminals of the hacking community. They typically hack out of pure curiosity or entertainment and often use poorly documented tools or scripts written by much more advanced hackers. have no formal InfoSec training and are typically not IT professionals. It is this lack of knowledge that contributes to the unpredictability of their actions and the random levels of damage that results from their attacks

A

Script kiddies

26
Q

is someone who or something that can exploit a vulnerability to attack an asset. That means that a threat could be a person (knowingly or not), a software program, or even a natural disaster

A

threat

27
Q

*eavesdropping methods
*discovery techniques
*service disruptions
*remote code execution.
*wiretapping
*port scanning
*taking control
*spoofing
*Denial-of-service (DOS)
*Social Engineering

A

common network attacks

28
Q

any process that allows an attacker to electronically eavesdrop on a conversation, whether between two humans or two computers.

A

wiretapping

29
Q

attack can also include putting special wiretaps in-line with a computer’s network cable and then using a device called a “packet sniffer” to listen and record the traffic on the network.

A

wiretapping

30
Q

To combat this problem, some organizations exclusively use fiber optic cables in their high-security areas. Though fiber optic cables are not immune to all ____ attacks, they are immune to EMF listening devices because fiber optic cables use photons (light) instead of electrons to transmit information

A

wiretapping

30
Q

application can systematically check each of these ports by sending thousands of TCP/IP packets to the victim’s computer, each packet on a different TCP port.

A

port scanning
for the attacker, this is easy because most network-accessible services open TCP ports to accept connections from legitimate client computers. An attacker just needs to send traffic to each and every port to learn which services are running

31
Q

allows an attacker to take control of a database server by inserting special commands into input boxes instead of entering basic text

A

SQL injection
instead of entering regular text, the user or attacker enters a specially crafted string of text that includes SQL commands designed to take control of the server.

32
Q

attack is made possible by applications that do not properly validate user input for extraneous content. In this case, the attacker purposefully enters text that is too large to fit within a region of memory

A

buffer overflow
This is not a regular or even random string of characters, though; it is compiled code that contains executable instructions that will grant the attacker control of the server. if the attacker correctly guesses the exact size of the memory buffer, the attacker can overflow it and trick the CPU into executing the rogue instructions.

33
Q

There are two main protections against these attacks. The first is to review your source code and verify that all user input fields are checked for robust or unplanned values. Second, enable the NX-bit (no-execute) functionality on the physical computer or VM to tag memory buffers as containing storage (data) or CPU instructions (code). With the NX-bit enabled, the CPU will only execute the contents of memory buffers identified as code.

A

popular attack vector is buffer overflow.
well-known attack called SQL injection

34
Q

To gain access to the information, the attacker needs to get into the middle of the conversation; however, to do so, the attacker must impersonate the sender and receiver of the traffic.

A

spoofing its identity

35
Q

An attacker wants to intercept the communication between a client computer (client) and a server. The attacker will likely use two network interfaces, one that is spoofed to look like the server and another to look like the client. When the real client attempts to contact the server, the attacker’s computer responds to the client and captures the request. The attacker then replays that connection request from their computer using the network interface that has been spoofed to appear as the client. The server exchanges information with the attacker believing the attacker is the client, and then the attacker forwards the response back to the actual client so that no one notices the break in connection

A

spoofing

36
Q

attackers use to cause an Ethernet switch to flood all traffic to every port on the switch, including the attacker’s computer.

A

spoofing variant: ARP poisoning

37
Q

deny someone access to a service, usually by overwhelming the victim with enormous amounts of useless traffic.

A

denial-of-service (DoS)
use features within the ICMP, such as “ping.”

38
Q

attackers learned that they could forge the source address of the echo-request, making the target computer believe the request came from another location and correspondingly send its echo-reply packets to another computer rather than the attacker. This redirection allows the attacker to continue attacking with minimal stress on the attacker’s computer.

A

DoS

39
Q

a trick whereby the attacker would send the victim a malformed ICMP packet that would cause the victim’s computer to crash or stop functioning on the network

A

the ping of death

40
Q

attack overwhelms a victim’s computer with an immense volume of ICMP echo-request packets, all containing a forged, randomized source address. The victim’s computer automatically begins sending ICMP echo-reply packets to all these forged source addresses, which eventually overwhelms the victim’s computer so that it cannot do its normal job.

A

ping flood

41
Q

potentially thousands of computers will bombard the victim. the attacker sends a forged ICMP echo-request packet to the broadcast address of a large IP subnet, which means that a massive number of computers would all receive the message. the attacker specifies the victim’s address as the source address. As each of the hundreds or thousands of computers receives the ICMP echo-request packet, each will respond by sending an ICMP echo-reply packet to the victim’s address, thereby crippling its network connection.

A

Smurf attack

42
Q

which cause the victim’s computer to consume excessive CPU time as it constantly sets up and tears down thousands of SSL encryption sessions over and over.

A

DDoS attack: SSL attacks

43
Q

This is a man-in-the-middle attack where the attacker impersonates the sender and receiver of
the traffic. The server unknowingly exchanges information with the attacker, believing they are
the client, then the attacker forwards the information to the client so nobody notices a break in
connection.

A

spoofing

44
Q

This form of attack can include putting special taps in-line with a computer’s network cable and
then using a packet sniffer to listen and record the traffic on the network.

A

wiretapping

45
Q

If an attacker gains access to your files or to your physical computers, the attacker can simply
steal a copy of the data and crack encryption at their own pace.

A

poor physical security measures

46
Q

social engineering

A

This is the act of manipulating human trust to gain access or information. Examples include
impersonation and phishing.

47
Q

how does a Smurf attack operate?

A

it spoofs the source address for all ICMP packets.

A Smurf attack attempts to spoof the source address of ICMP packets and broadcast to the network in an attempt to flood it.

48
Q

which software protection provides malware identification?

A

antivirus.
Antivirus software protects against malware, identifies it, quarantines it, and removes it.

49
Q

which device provides web content filtering and URL scanning?

A

Web proxy.
A web proxy filters internet content and performs security checks on sites visited, files downloaded, etc.

50
Q

is a server or device that is configured to look very authentic, potentially containing data that appears to be legitimate user data, or configuration files that seem authentic

A

honeypot
also known as a “tar pit” because it is intended to attract or distract would-be attackers from the actual targets on the network. The goal of the honeypot is to provide a false positive for hackers, whereby the attacker breaches the honeypot and believes the data it contains is the target’s actual data.

51
Q

similar to a honeypot in that it contains data that is fictitious; however, the server is also designed to slow down the attacker so that tracing information can be obtained by the intrusion detection system (IDS).

A

tar pit

52
Q

you will use multiple tools and methods together in an overlapping manner to create rings or layers of security. If one component is compromised, there should be at least one other obstacle to overcome before the attacker gains access to the system.

A

in-depth defense approach to network security
you will mix different methods of defense, such as using an application-aware firewall on the perimeter and then relying on an intrusion prevention system (IPS) within the network and firewall and anti-malware software on the servers.

53
Q

plan should first help contain the damage from the attack, which may involve quarantining computers or severing network connections, and then work to remove the threat and clean up the damage.

A

response plan
be sure to develop and test your containment plans before an attack occurs