Network Security Flashcards
What do most firewalls use as the last rule?
Implicit deny rule
What type of cloud-based service is webmail?
Software as a Service (SaaS)
What type of attack can a flood guard help prevent?
SYN flood attack
What can a company use to distribute web-based requests to several web servers hosting the same content?
Load balancer
What are two common protocols used to secure FTP?
File Transfer Protocol Secure (FTPS) and Secure FTP (SFTP)
A network is using CAT 5 cable. What can prevent data loss?
Shielding
What protocol does SFTP use?
Secure FTP (SFTP) uses Secure Shell (SSH) over port 22.
Provides restarting and continuing interrupted transfers
Listing directories
Removing remote files
What is a wireless device that provides unauthorized access to a network?
Rogue access point
What is a wireless device that provides unauthorized access to a network and uses the same SSID as an authorized wireless access point?
Evil twin
What is needed to use WPA2 with an 802.1X server instead of using pre-shared keys?
Remote Authentication Dial-in User Service (RADIUS)
What should be used to prevent wireless users from accessing other wireless computers through a wireless access point?
Isolation mode
You want to reduce the success of war driving. What can you do to the WAP?
Reduce the power output of the WAP (or adjust the antenna placement)
What protocol provides the best security for a wireless network?
WPA2
What wireless security protocol has been hacked and should not be used?
WEP
What should be done with the SSID for security?
Change default name
What can you do with the SSID to hide a wireless network from casual users (but not informed attackers)?
Disable said broadcasting
What can be used to prevent specific wireless computers from accessing a wireless network?
MAC filtering
What protocol is used to monitor network devices?
Simple Network Management Protocol (SNMP)
An organization wants to allow 300 employees to remotely access the corporate network. What is a good choice?
Virtual private network (VPN) concentrator
What would an organization create to host Internet-based servers but protect servers on an internal network?
Demilitarized zone (DMZ)
What port would you block to prevent Telnet traffic?
Port 23
What port does TFTP use?
Trivial File Transfer Protocol (TFTP) uses port 69
Between UDP and TCP, what does FTP use?
File Transfer Protocol (FTP) uses TCP
Between UDP and TCP, what does TFTP use?
Trivial File Transfer Protocol (TFTP) uses UDP
What port does SCP use?
Secure Copy (SCP) uses port 22
What port does SMTP use?
Simple Mail Transfer Protocol (SMTP) uses port 25
What port does HTTPS use?
Port 443
What can an attacker check to determine the services running on a server?
Open ports
What should you do with unused ports on a switch for better security?
Disable them
Your organization uses switches for connectivity. Of the following choices, what will protect the switch? (A)Disable unused MAC addresses (B)Disable unused ports (C)Disable unused IPv4 addresses (D)Disable unused IPv6 addresses
Disabling unused ports is a part of basic port security.
Of the following choices, what represents the best choice to prevent intrusions on an individual computer? (A)HIDS (B)NIDS (C)Host-based firewall (D)Network-based firewalls
A host-based firewall can help prevent intrusions on individual computers such as a server or desktop computer.
Of the following choices, what controls traffic between networks? (A)A firewall (B)Load balancer (C)VPN concentrator (D)Protocol analyzer
A firewall controls traffic between networks using rules within an ACL.
An organization has a web security gateway installed. What function is this performing? (A)MAC filtering (B)Caching content (C)Hiding internal IP addresses (D)Content filtering
A web security gateway performs content filtering (including filtering for malicious attachments, malicious code, blocked URLs and more).
Your organization hosts a large web site served by multiple servers. They need to optimize the workload and distribute it equally among all the servers. What should they use? (A)Proxy server (B)Load balancer (C)Web security gateway (D)Security appliance
A load balancer can optimize and distribute data loads across multiple computers or multiple networks.
Of the following choices, what is the best choice for a device to filter and cache content from web pages? (A)Web security gateway (B)VPN concentrator (C)Proxy server (D)MAC filtering
A proxy server includes the ability to filter and cache content from web pages.
What can an administrator use to detect malicious activity after it occurred? (A)Firewall (B)Sniffer (C)Port scanner (D)IDS
An intrusion detection system (IDS) detects malicious activity after it has occurred.
Of the following choices, what would detect compromises on a local server? (A)HIDS (B)NIPS (C)Firewall (D)Protocol analyzer
A host-based intrusion detection system (HIDS) can detect attacks (including successful attacks resulting in compromises) on local systems such as workstations and servers.
Of the following choices, what represents the best choice for a system to detect attacks on a network, but not block them? (A)NIDS (B)NIPS (C)HIDS (D)HIPS
A network-based intrusion detection system (NIDS) will detect attacks, but will not necessarily block them (unless it is an active NIDS).
Your organization is using a NIDS. The NIDS vendor regularly provides updates for the NIDS to detect known attacks. What type of NIDS is this? (A)Anomaly-based (B)Signature-based (C)Prevention-based (D)Honey-based
Signature-based, network-based intrusion detection systems (NIDS) use signatures similar to antivirus software, which are downloaded regularly as updates.
You are preparing to deploy an anomaly-based detection system to monitor network activity. What would you create first? (A)Flood guards (B)Signatures (C)Baseline (D)Honeypot
An anomaly-based (also called heuristic or behavior-based) detection system compares current activity with a previously created baseline to detect any anomalies or changes.
Of the following choices, what best describes the function of an IPS?
(A)Detect attacks
(B)Stop attacks in progress
(C)Prevent attackers from attacking
(D)Notify appropriate personnel of attacks
The primary purpose of an intrusion prevention system (IPS) is to stop attacks in progress.
Of the following choices, what provides active protection for an operating system? (A)NIDS (B)NIPS (C)HIDS (D)HIPS
A host-based intrusion prevention system (HIPS) provides active protection for an individual host, including its operating system.
Of the following choices, what most accurately describes a NIPS?
(A)Detects and takes action against threats
(B)Provides notification of threats
(C)Detects and eliminates threats
(D)Identifies zero day vulnerabilities
A network-based intrusion prevention system (NIPS) attempts to detect and mitigate threats by taking action to block them.
An IPS is monitoring data streams looking for malicious behavior. When it detects malicious behavior, it blocks the traffic. What is this IPS using? (A)Smurf detection (B)Honeypot (C)Content inspection (D)Port scanner
Many intrusion prevention systems (IPSs) use content inspection techniques to monitor data streams in search of malicious code or behaviors.
A user plugged a cable into two RJ-45 wall jacks connected to unused ports on a switch. In a short period, this disrupted the overall network performance. What should you do to protect against this problem in the future? (A)Enable loop protection on the switch (B)Disable port security (C)Create DMZ (D)Use a VLAN
Loop protection such as Spanning Tree Protocol (STP) protects against the switching loop problem described in the scenario.
What can you use to logically separate computers in two different departments within a company? (A)A hub (B)A VLAN (C)NAT (D)A flood guard
A virtual local area network (VLAN) can group several different computers into a virtual network, or logically separate the computers in two different departments.
Most firewalls have a default rule placed at the end of the firewalls ACL. Which of the following is the most likely default rule? (A)Deny any any (B)Deny ICMP all (C)Allow all all (D)Allow TCP all
A deny any any or drop all statement is placed at the end of an ACL and enforces an implement deny strategy.
Of the following choices, what best describes a method of managing the flow of network traffic by allowing or denying traffic based on ports, protocols, and addresses? (A)Implicit deny (B)Firewall rules (C)Proxy server content filter (D)Firewall logs
Firewalls use firewall rules (or rules within an ACL) to identify what traffic is allowed and what traffic is denied. A basic packet filtering firewall can filter traffic based on ports, protocols, and addresses.
Your network includes a subnet that hosts accounting servers with sensitive data. You want to ensure that users in the Marketing department (on a separate subnet) cannot access these servers. Of the following choices, what would be the easiest to achieve the goal?
(A)Enable load balancing
(B)Enable port security
(C)Use an ACL
(D)Add a host-based firewall to each server.
An access control list (ACL) on a router can block access to the subnet from another subnet.
You are deploying a remote access server for your organization. Employees will use this to access the network while on the road. Of the following choices, what must you configure? (A)NAC (B)ACLs (C)MACs (D)NAT-T
Access control lists within a firewall must include rules to open the appropriate ports.
You are reviewing a firewall's ACL and see the following statement: drop all. What security principle does this enforce? (A)Least privilege (B)Integrity (C)Availability (D)Implicit deny
A drop all or deny any any statement is placed at the end of an access control list (ACL) and enforces an implement deny strategy.
Firewalls include rules in an ACL. Which of the following would block network traffic that isn't in any of the previously defined rules? (A)Explicit allow (B)Implicit allow (C)Explicit deny (D)Implicit deny
Most firewalls have an implicit deny statement (such as drop all or deny any any) at the end of an access control list (ACL) to block all traffic not previously allowed.
An organization recently created a security policy. Of the following choices, what is a technical implementation of security policy? (A)Training (B)Acceptable use acknowledgement (C)Implicit deny rule in a firewall (D)Job rotation
Firewall rules (including the implicit deny rule) provide technical implementation of security policies. The other choices are not technical controls.
Which of the following IP addresses are on the same subnet? I. 192.168.1.50, 255.255.255.192 II. 192.168.1.100, 255.255.255.192 III. 192.168.1.165, 255.255.255.192 IV. 192.168.1.189, 255.255.255.192 (A)I and II (B)II and III (C)III and IV (D)All of them
Both 192.168.1.165 and 192.168.1.189 are on the same subnet since bits 25 and 26 are the same (10). If a calculator is needed on the exam (such as for a problem like this), it will be available.
Of the following choices, what can be used to allow access to specific services from the Internet while protecting access to an internal network? (A)SSH (B)Implicit deny (C)DMZ (D)Port security
A demilitarized zone (DMZ) can provide access to services (hosted on servers) from the Internet while providing a layer of protection for the internal network.
Of the following choices, what hides the IP addresses of computers inside a network from computers outside the network? (A)Web security gateway (B)Replacing all hubs with switches (C)WAF (D)NAT
Network Address Translation (NAT) translates public IP addresses to private IP addresses, and private back to public and hides addresses on the internal network.
Your organization is creating a site-to-site VPN tunnel between the main business location and a remote office. What can they use to create the tunnel? (AWPA2-Enterprise (B)RADIUS (C)NAC (D)IPsec
IPsec is one of many tunneling protocols the organization can use to create a VPN tunnel.
You are planning to deploy a VPN with IPsec. Users will use the VPN to access corporate resources while they are on the road. How should you use IPsec? (A)With AH in tunnel mode (B)With AH in transport mode (C)With ESP in tunnel mode (D)With ESP in transport mode
Encapsulating Security Payload (ESP) in tunnel mode encapsulates the entire IP packets and provides confidentiality, integrity, and authentication.
An employee connects to the corporate network using a VPN. However, the client is not able to access internal resources, but instead receives a warning indicating their system is not up-to-date with current patches. What is causing this behavior?
(A)The VPN is using IPsec
(B)The VPN is not using IPsec
(C)NAC is disabled on the network and remediation must take place before the client can access internal resources
(D)NAC is enabled on the network and remediation must take place before the client can access internal resources
Network access control (NAC) inspects clients for specific health conditions and can redirect access to a remediation network for unhealthy clients.
What technology can an organization use to assist with computing requirements in heavily utilized systems? (A)ISP (B)DLP (C)Cloud computing (D)Remote wipe
Cloud computing is very useful for heavily utilized systems and networks, and cloud providers provide the services.
Employees in your organization access web-based email using cloud-based technologies. What type of technology is this? (A)IaaS (B)PaaS (C)SaaS (D)Network-based DLP
Applications such as web-based email provided over the Internet are Software as a Service (SaaS) cloud-based technologies.
Of the following choices, what is the best explanation of what a PaaS provides to customers?
(A)Web-based applications provided over the Internet.
(B)A device that reduces the risk of employees emailing confidential information outside the organization
(C)Protection against VM escape attacks
(D)An easy-to-configure operating system and on-demand computing capabilities
Platform as a Service (PaaS) provides cloud customers with an easy-to-configure operating system and on-demand computing capabilities.
An organization is considering using virtualization in their datacenter. What benefits will this provide? I. Increased footprint II. Decreased footprint III. Reduction in physical equipment needing security IV. Elimination of VM escape attacks (A)I and II (B)II and III (C)III and IV (D)All of them
Virtualization can reduce the footprint of a datacenter, eliminate wasted resources, and result in less physical equipment needing physical security.
An organization wants to hide addresses it uses on its internal network. What can assist with this goal? (A)MAC filtering (B)NAC (C)NAT (D)DMZ
Network Address Translation (NAT) translates public IP addresses to private, private IP addresses back to public, and hides addresses on the internal network.
You have been tasked by your manager to perform an evaluation of the benefits of using virtualization in your QA testing environment. Which of the following is an advantage of using virtual machines in terms of security and cost efficiency?
A. It reduces the need to install OS software updates.
B.Multiple operating systems can be installed and run in their own separate, secure area on a single hardware device.
C. It helps secure the hardware from unauthorized access.
D. Antivirus and other security software only have to be installed once.
B. Virtual machines all run in their own separate and isolated area on the system as if they were on a separate physical machine. This greatly increases security, as any issues arising in one virtual machine will not affect another virtual system. This also allows multiple operating systems to be installed on the same physical hardware, which saves money by avoiding the need to buy multiple hardware systems.
After a security review, it is recommended that your organization install a network intrusion prevention system (NIPS). Based on the current budget, your manager recommends that you install a less-costly network detection system (NIDS). What is the primary security difference between a network intrusion detection system (NIDS) and a network intrusion prevention system (NIPS) that you can use to justify the additional costs?
A. A NIDS system only detects TCP/IP attacks.
B. The NIPS system actively tries to mitigate an incoming intrusion rather than just detect it.
C. The NIDS system can raise alarms when it detects an intrusion.
D. A NIPS system is only host based, not network based.
B. The NIPS system actively tries to mitigate an incoming intrusion rather than just detect it. A network intrusion detection system actively monitors for intrusions and will alert the administrator when one is detected. A network intrusion prevention system goes a step further and tries to actively prevent the intrusion as it is occurring.
You must install and secure your organization’s Internet services, including web, FTP, and e-mail servers, within your current network topology, which uses a network firewall to protect your internal networks. In which security zone of your network should these servers be installed to isolate them from the Internet and your internal networks?
A. DMZ
B. VLAN
C. Internal network
D. Intranet
A. The demilitarized zone (DMZ) is a network that typically contains Internet servers and services that are accessible from the outside world but should be isolated from your internal network. The DMZ ensures incoming connections for these services are routed to the DMZ and never reach the internal LAN.
You are configuring your network to ensure that all details of internal IP addresses in your network are hidden from outside networks. You must also allow several internal hosts to be able to use an external IP address when communicating outside the network. Which of the following network security methods should you use?
A. NAT
B.VPN
C.VLAN
D. IP spoofing
A. Network address translation (NAT) allows internal hosts with nonroutable Internet addresses to access the Internet using an external address. NAT also hides the IP information of the internal network from the outside world.
Your organization is growing fast, and the number of clients and devices on your network has doubled in size over the last year. To help better partition and secure your network, which networking technology could you use?
A. NAT
B. NAC
C. VPN
D. VLAN
D. A virtual LAN (VLAN) is used to segment a network into smaller logical units to aid in security and performance. The virtual LANs are logically isolated from each other to prevent network traffic and unauthorized access.
Your organization has a large remote user base, and it is becoming difficult to enable them to access a legacy local application server and share and collaborate on project documents. Which of the following technologies could you use to provide secure, centralized access to these resources?
A. VLAN
B. Web-based cloud computing application
C. Virtualization
D. VPN
B. You could convert your legacy application to a secure, cloud-based web resource that allows clients to remotely access the application and its data from any Internet connection. The data can be easily shared, and multiple users can collaborate on projects.
You need to implement a solution that allows your users to browse web content safely, and also protect the company from legal liabilities in regard to the downloading of inappropriate and offensive content. Which of the following security devices would you install?
A. Antispam filter
B. Firewall
C. Web proxy
D. Web security gateway
D. A web security gateway device is specifically engineered to content-filter HTTP web traffic and prevent attacks on web clients via the HTTP protocol. A network firewall, web proxy, or antispam filter would not prevent security issues specifically for HTTP applications.
Many of your users are downloading MP3 music files from the Internet and using up the company’s valuable bandwidth resources. Which technology could you implement to help block the transfer of these files from the Internet?
A. Content filter
B. Antispam filter
C. Protocol analyzer
D. Intrusion detection system
A. A content filtering server can analyze network traffic and block specific file types, such as MP3 music files, from being downloaded. The end users will receive an error when they try to access blocked files.
Your users are complaining that web browsing is very slow, but your small office cannot afford a faster Internet connection. Which of the following technologies would help improve web browsing performance?
A. Web proxy
B. Firewall
C. Authentication proxy
D. Intrusion detection system
A. Web proxy servers are used primarily for their caching capability, which boosts web browsing performance by storing content retrieved from an external web serve
You have discovered there may be a networking security issue between your network firewall and e-mail server, which is accepting connections from an unauthorized external e-mail server. Which of the following network security tools would be best used for examining network traffic between your firewall and your e-mail server?
A. Intrusion detection system
B. Proxy server
C. Protocol analyzer
D. Firewall server
C. A protocol analyzer is best suited for examining and capturing network packets and frames between the two devices. You would be able to examine the network traffic to determine the details of the unauthorized connection and use firewall rules to block it.
You need to set up a secure FTP server to allow your company’s clients to upload their files. Which of the following FTP protocols would you use?
A, SFTP
B. FTP
C. TFTP
D. FTP over HTTP
A. SFTP is used to encrypt FTP sessions with SSH (Secure Shell). The other methods such as FTP, TFTP, or FTP over HTTP are not secure and communicate in clear text.
You want to secure one of your network switch segments to only allow access from specific clients on the development network. Which of the following should you implement?
A. Use a VPN for the development network.
B. Create a firewall rule to restrict access to the switch ports.
C. Create a VLAN for the entire development network.
D. Restrict the switch port access to the MAC addresses of the clients.
D. You should enable MAC address security on your switch ports to only allow the hardware addresses of the specific clients on the development network to access those ports.
You need to secure one of your routers (IP address 10.1.5.25) to prevent access to the SNMP port. On your firewall, which of the following access rules will block SNMP access to the router?
A. permit 10.1.5.25 udp port 53
B. deny 10.1.5.25 tcp port 143
C. deny 10.1.5.25 udp port 161
D. permit 10.1.5.25 udp port 389
C. The access rule should be set to deny the SNMP UDP port 161 for the specified IP address.
It is discovered that your primary router has a serious software vulnerability that makes it susceptible to denial-of-service attacks. What should you do to resolve the issue?
A. Disable SNMP
B. Disable ICMP
C. Enable flood protection.
D. Update the firmware.
D. In the event that a documented vulnerability is found in a network device firmware or operating system, it should be updated or a patch applied to fix the bug to prevent the device from being compromised.
Your web server is being flooded by a denial-of-service attack. Using a network analyzer, you see that there are IP broadcast replies being sent back to the address of your server from multiple addresses. Which type of network attack is this?
A. Man-in-the-middle
B. Back door
C. Smurf
D. DNS poisoning
C. A smurf attack uses a spoof attack combined with a DDoS attack to exploit the use of IP broadcast addressing and ICMP. By spoofing the address of the web server in an IP broadcast, the attacker causes the replies from other systems on the network to the broadcast all to be sent back to the web server, causing a denial of service.
When creating firewall rules, which of the following principles should be applied to maximize security by blocking all traffic and only allowing access as
required?
A. Implicit deny
B. Explicit deny
C. Unauthenticated deny
D. Denial of service
A. Implicit deny means that anything that is not explicitly defined in an access rule is denied. This denies all access by default until you apply access rules for only the specific services required.
During a denial-of-service attack, a network administrator blocks the source IP with the firewall, but the attack continues. What is the most likely cause of the problem?
A. The denial-of-service worm has already infected
the firewall locally.
B. The attack is coming from multiple, distributed
hosts.
C. A firewall can’t block denial-of-service attacks.
D. Antivirus software needs to be installed.
B. A distributed denial-of-service (DDoS) attack comes from multiple, geographically distributed hosts, making it difficult for the network administrator to block it.
You have just performed a security port scan on your e-mail server. Which of the following services and ports that appeared in the test as open and accepting connections should be disabled?
A. TCP port 21
B. TCP port 25
C. TCP port 110
D. TCP port 143
A. TCP port 21 (FTP) is not required on your e-mail server, and it should be disabled to prevent hackers from connecting to the e-mail server on this port.
Your network router has the ability to be remotely configured through a web browser. Which of the following would be the most secure method for remote access?
A. FTP over HTTP connection
B. HTTP connection
C. Telnet
D. HTTPS connection
D. To securely administer your router remotely with a web browser, you should make sure you are using an HTTPS connection that is encrypted via SSL. Other methods send their communications in clear text.
You have just installed a new SNMP monitoring system for all your network devices. Which of the following should you do to enhance security for the implementation?
A. Change the password of the network monitor.
B. Disable SNMP access on all inbound network ports.
C. Change the default SMTP community string.
D. Enable ICMP.
C. The default SNMP community string is “public.” This is a basic type of password used between all systems being monitored by SNMP. This should be changed to a more secure value.
You have connected to a free, open Wi-Fi hotspot at your local coffee shop. Which of the following security measures should you use to secure your session?
A. Only use HTTPS sites secured with SSL.
B. Set up MAC address filtering.
C. Use a packet sniffer.
D. Reconnect at regular intervals to refresh the encryption key.
A. When using an open wireless access point and browsing personal web sites such as your e-mail and banking sites, make sure you use secure, encrypted websites via SSL, or use a VPN connection. This ensures that your session with the web server is encrypted. Any hacker on the same open network can use a packet sniffer to view unencrypted communications.
You have set up a wireless network for your small office of 50 users. Which of the following encryption protocols would you implement to ensure the highest level of encryption security?
A. WAP
B. WPA
C. WEP-128 bit
D. WPA2
D. WPA2 is currently the strongest level of encryption security available for a wireless network. WPA2 replaces the weaker WPA and adds Robust Security Network (RSN) support that includes added protection for ad hoc networks, key caching, preroaming authentication, and CCMP, which utilizes the AES cipher to replace TKIP
You are connecting to a secure, encrypted wireless network. During the initial connection phase, you are asked to enter a passphrase. Which WPA encryption method is in use on the network?
A. WPA-EAP
B. WPA-TKIP
C. WPA-PSK
D. WPA-Enterprise
C. WPA-PSK uses a preshared key passphrase that requires all devices on the wireless network to use the same passphrase to access the network. WPA-Enterprise uses an authentication server to perform key management and exchange for all wireless clients.
You are setting up new Bluetooth-enabled mobile phones for your executive team. Which of the
following security features do you enable to prevent Bluesnarfing?
A. Enable link-level security.
B. Disable the IR port.
C. Disable wireless access.
D. Set an SSID.
A. Bluesnarfing is a hacking method in which an unauthorized user can connect to unprotected Bluetooth devices and access any data stored on the device. Link-level security authenticates the actual communications link before data transmission begins. Data encryption can also be performed when the link is authenticated
You are setting up a new wireless security network for your small office. You have set the SSID of the network to a secure value. Which other feature can you enable to enhance SSID security?
A. Enable SSID broadcast.
B. Enable SSID tunneling.
C. Disable SSID snarfing.
D. Disable SSID broadcast.
D. By disabling SSID broadcast, you assure your access points will not advertise the SSID they are using for wireless clients to connect. A user would require prior knowledge of the SSID before he could access the network.
Which of the following types of wireless attacks utilizes a weakness in WEP key generation and encryption to decrypt WEP encrypted data?
A. IV attack
B. War driving
C. PSK attack
D. Eavesdropping
A. The IV (initialization vector) attack uses the weakness in the 24-bit generated IV that is paired with the WEP encryption key. The IV can be discovered over time on busy networks that use repeat IV values, and used to decrypt the cipher stream without knowing the WEP key.
To further secure your wireless network, you implement MAC address filtering. Which of the following statements describes the wireless network behavior after you enable MAC address filtering?
A. It allows wireless access only for specified MAC addresses.
B. It prevents wireless access only from specified MAC addresses.
C. It encrypts only specified wireless device MAC addresses.
D. It encrypts only MAC addresses not specified.
A. A list of authorized client MAC addresses must be configured on each access point for the network. If any client tries to communicate with the access point and its MAC address isn’t in the list, it will be denied access.
After checking the signal strength of a specific floor of your building, you realize that two of the farthest offices on the floor have very poor signal strength. Which of the following actions can you perform to provide a cost-effective solution to increase signal strength to that part of the building?
A. Disable encryption to speed up the network.
B. Add an additional access point.
C. Use a cable to extend the antenna range of the closest access point.
D. Switch to the 5 GHz band instead of 2.4 GHz.
B. You can use a cable and an external antenna to extend the range of your closest access point to the office with the low signal. This is an easy and inexpensive solution rather than purchasing and installing a new access point.
You are installing a wireless network in a manufacturing facility. Which of the following aspects of the wireless network do you concentrate on to prevent security issues with EMI?
A. Use of WPA2 encryption
B. Use of 802.11g or 802.11n
C. SSID network name
D. Access point and antenna placement
D. Antenna and access point placement is important to make sure that it is not close to any other electrical wires or devices (especially those that broadcast on a similar frequency) where electrical interference can cause a loss of wireless signal.
Your company is moving to a new facility, and you are responsible for installing a wireless network for the new office building. Which of the following should you perform to prepare for a secure implementation?
A. Back up the current wireless configuration.
B. Check for war chalking at the new site.
C. Perform a site survey.
D. Perform a radio frequency sweep.
C. An initial site survey should be performed before installation of a wireless network to ensure the environment will be conducive to wireless communications. The survey can also help determine the best placement and coverage for your wireless access points.
Name the 4 Monitoring Methodologies
- Signature-Based
- Behavior/Anomaly-Based
- Heuristic-Based
- Rule-Based
What is Signature-Based Monitoring?
What are the Pros/Cons?
It works by using a predefined db of known attacks that have appeared previously. Each type can be recognized by its unique chars, and signature.
Pros- Powerful and efficient because it relys on the collective knowledge of security vendors.
Cons - Must keep db continually updated.
Unable to detect very new attacks whose signatures are not yet availble.
What is Behavior/Anomaly-Based Monitoring?
What are the Pros/Cons?
A baseline of normal behavior and then monitor network traffic based on these performance profiles to recognize behavioral anomalies that exceed the thresholds of the normal baseline.
Pros - More effient as time goes on (more data collected)
Easily and quickly adapt to the current environment and can detect new variants of attacks that a signature or rule-based might not.
Which authentication protocol is commonly used in WLAN and LAN implementation? A. CHAP B. PAP C. PPP D. EAP
D. EAP
Five users in an organization require concurrent access to a medical application that requires expensive licensing, what can be done to ensure that the employees can access the application, reduce costs, and promote an ethical office?
A. Obtain a platform as a service agreement with a cloud computing provider
B. Obtain a software as a service agreement with a cloud computing verndor
C. Obtain one license for th software and provide access to clients using thin client software
D. Obtain an infastructure as a service agreement with a cloud computing agreement
B. Obtain a software as a service agreement with a cloud computing verndor
Why is it not recommended to sending credit card infomation in an instant message?
A. traffic is easily sniffed
B. may have spyware installed
C. It is not an official form of payment, as it requiresa signature
D. It could have a trojan virus
A. traffic is easily sniffed
In the past, there have been some cases of virus infected computers from subnet A attempting connections with computers on subnet B using port 5959. To prevent infection of subnet B computers, a security solution is required. What can be implemented on the router to prevent traffic on that specific port? A. VLAN management B. Access control list C. Loop protection D. Port security
B. Access control list
Which port does HTTPS use? A. 23 B. 21 C. 80 D. 443
D. 443
Name the Classes and address ranges of the private IPs
class A network - 10.0.0.0 - 10.255.255.255 class B network - 172.16.0.0 - 172.31.255.255 class C network - 192.168.0.0 - 192.168.255.255
What is a Web security gateway?
It is a device that is specifically engineered to content-filter HTTP web traffic and prevent attacks on web clients via the HTTP protocol.
Used for safe web-browsing and block certain content downloading.
What is a web-proxy used for?
Servers(s) primarily used for caching capability, which boosts web browsing performance by storing content retrieved from tan external web server.
What is a protocol analyzer used for?
It is best suited for examining and capturing network packets and frames between the firewall and the email server.
List the 13 common internet based network and application protocols.
- TCP/IP
- ICMP
- HTTP/HTTPS
- Telnet
- SSH
- FTP
- TFTP
- FTPS/SFTP
- SCP
- DNS
- SNMP
- IPsec
- NetBIOS
What protocols send data as plain text?
What does this make them vulnerable to?
TCP UDP HTTP FTP Packet sniffing and Spoofing because they don't use authentication functions.
What is the difference between IPv4 and IPv6 and what are they used for?
They are used for the IP or address of a computer.
IPv4 -
IPv6 -
Name the 7 layers of the OSI model.
What are the data item (PDU) referred to at each layer?
- Application - Data
- Presentation - Data
- Session - Data
- Transport - Segments
- Network - packets
- Data Link - frames
- Physical - Bits
What is the OSI Application Layer? Give examples of protocols used at this layer.
7th layer: It provides services needed by software applications to help users interact with the network.
Protocols:
HTTP,FTP, SMTP, DHCP, NFS, Telnet, SNMP, POP3, NNTP and IRC
What is the OSI Presentation layer?
Give examples of protocols used at this layer.
6th layer: is responsible for data presentation, ensuring that the data sent from the application layer can be read by the corresponding application layer on the receiving end.
It defines protocols that provide coding and data conversion function - transition, (de)compression, encryption and decryption. These are applied to the application level data to make it transparent to the layers around it.
Protocols:
SSL
What is the OSI Session layer?
Give examples of protocols used at this layer.
5th layer: Required for inter-host communication. Establish, maintain and terminate communication sessions between the software application on different networks. Attaches header information to data packets and coordination data transfer for providing dialog control between devices and determine if data is to be sent as simplex, half-duplex or full-duplex messages.
Protocols:
PPTP
What is the OSI Transport layer?
Give examples of protocols used at this layer.
4th layer: Provides the services required for end-to-end connectivity and ensuring that data is delivered error-free and in the proper sequence.
Provides process-level addressing, multiplexing and e-multiplexing, and segmentation, packaging and reassembly of data. Includes protocols for establishing , managing, and termination of connections for acknowledgement and retransmission of lost data, flow control, error checking and recovery.
Protocols:
TCP, UDP
What is the OSI Network layer?
Give examples of protocols used at this layer.
3rd layer: Enable multiple individual networks to be combined into an internetwork.. Handles logical addressing. It provides path determination- routing messages using the best path available and is responsible for creating virtual circuits between network devices. Performs datagram and encapsulation, packet fragmentation and reassembly, and error handling and diagnostics.
Protocol:
IP
What is the OSI Data Link layer?
2nd Layer: Provides services for the various protocols at the network layer. Divided into 2 sub layers: logical link control (LLC) and media access control (MAC).
LLC - takes the packets from the network layer and breaks them into frames using synchronization flow control and error checking functions.
MAC - provides control for accessing the transmission medium at the physical layer. It converts the data into binary digits and prepares them for the physical layer.
What is the OSI Physical layer?
1st layer: defines the networks hardware specs and physical topology. Defines the encoding and signaling functions required to transmit data across the transmission medium and physically transmits and receives data.
List the DARPA (DoD) Model layers and the protocols it uses.
- Application - mail, file transfer, login applications
- Transport (Host-to-Host) TCP or UDP
- Internet - package, route, transmit via IP
- Network Access (Link) physical data delivery
Uses TCP/IP protocols (TCP/IP Model)
What is the TCP/IP protocol suite?
A set of network protocols that specifies how computers communicate, and provides a set of conversions for interconnection networks and routing traffic. Fucntions independent of the underlying network tech. Includes and integrated addressing system (IP). Operates at OSI layers Application, Transport, Internet and Network Interface.
2 Main Transport Protocols:
TCP - connection-oriented delivery
UDP- connectionless delivery. No error checking
What is an ICMP protocol?
Is used to transmit control messages between systems. Used for diagnostics (ping)
Which DoD model layer is responsible for packaging, addressing, and routing data so it can be transmitted?
Internet Layer
What is ICMP
Control Message Protocol - used to send management messages between systems.
What port allows for the exchange of data through a channel made secure by Secure Shell (SSH)
port 22
What port is used to transmit email retrieved from a server via Post office protocol version 3 (POP3)?
Port 110
Which port handles Simple Mail Transfer protocol (SMTP), which is used to send email
port 25
Which port is the Domain Name Service (DNS), which translates domain names into IP addresses
port 53 (TCP or UDP)
Which port is HTTP over Secure Sockets layer or HTTPS, which
port 443
Which port is used for Telnet, which provides login capabilities on a remote host
port 23
Which port is used for Transmitting data on a diskless workstation via the Bootstrap Protocol or BOOTP
port 67
Which port is used for Network Time Protocol (NTP) to synchronize the clock times of computer?
port 123
Which port is used for Exchange management information via Simple Network Management Protocol, or SNMP
port 161
Which port is used for Transferring files via Trivial File Transfer Protocol (TFTP)
port 69
Which port is used for SSH File Transfer Protocol (SFTP), which provides additional function to control files.
port 22
Which port is used for Hyper Transfer Protocol (HTTP), which web servers and clients use to communicate
port 80
Which port is used for FTP over SSL (FTPS), which transfers data between a client and server
port989
Which port is used for Message Access Protocol (IMAP), which retrieves email messages
port 143
Name the NetBIOS service and tis port
Name Service - 137
Datagram Service - 138
Session Service - 139
Name the NetBIOS services and their ports
- Name Service - TCP/UDP 137 usually UDP
- Datagram Service used to send small msgs - UDP 138
- Session Service allow 2 computers communicate lrg msgs via a connection with error detection and recovery - TCP 139
What are the 2 Protocols for TCP/IP at the Transport layer?
TCP Transmission Control Protocol
UDP User Datagram Protocol